Static task
static1
Behavioral task
behavioral1
Sample
df64cabc7e7833f3f643de67c4b8d17e2edb57312c937f8640c6ff2c332c0139.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df64cabc7e7833f3f643de67c4b8d17e2edb57312c937f8640c6ff2c332c0139.dll
Resource
win10v2004-20221111-en
General
-
Target
df64cabc7e7833f3f643de67c4b8d17e2edb57312c937f8640c6ff2c332c0139
-
Size
19KB
-
MD5
efa38e0c2506dbe36ab90b60515d33d8
-
SHA1
41cd0726e25da6bc2a8fffb523dee8aaa02ee6c0
-
SHA256
df64cabc7e7833f3f643de67c4b8d17e2edb57312c937f8640c6ff2c332c0139
-
SHA512
52cceda470c59368f9eac2238ad61fb68f02d7a81fee543329d286d9c152ead7f86c594254ccb715156ad0550c120d3291182d52a6b9848950f41bded6bbf7d7
-
SSDEEP
192:u+Jtlfhrv1xWX7IzT33CIKmRZ1tBTk45564DuwyoR0j/RN3W5yJv:5MIzrCyjvNUvLRN3Wg
Malware Config
Signatures
Files
-
df64cabc7e7833f3f643de67c4b8d17e2edb57312c937f8640c6ff2c332c0139.dll windows x86
ff0182c79cd8e9d1e7127cf034dfa8fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcmpA
FindFirstFileA
VirtualProtectEx
GetProcAddress
GetModuleHandleA
Module32Next
Module32First
ReadFile
GetLastError
OpenProcess
WinExec
TerminateProcess
GetCurrentProcess
ExitProcess
SuspendThread
OpenThread
ReleaseMutex
GetSystemDirectoryA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
lstrlenA
CreateFileA
WriteFile
GetTempPathA
GetTickCount
lstrcpyA
Sleep
CreateMutexA
CreateThread
CloseHandle
GetModuleFileNameA
GetCurrentProcessId
user32
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
EnumWindows
MessageBoxA
GetWindowThreadProcessId
OpenWindowStationA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shlwapi
StrStrIA
msvcrt
strncpy
strcmp
_purecall
strncat
strcat
sprintf
strlen
memcpy
strstr
memset
_itoa
strcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
wininet
InternetCloseHandle
Sections
.bss Size: - Virtual size: 13KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ