Intersection
Static task
static1
Behavioral task
behavioral1
Sample
dd578992950cc2254a965ef4b03203a145b196c3ce03ae7d493b47c77e4b2d77.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd578992950cc2254a965ef4b03203a145b196c3ce03ae7d493b47c77e4b2d77.dll
Resource
win10v2004-20220812-en
General
-
Target
dd578992950cc2254a965ef4b03203a145b196c3ce03ae7d493b47c77e4b2d77
-
Size
9KB
-
MD5
1f8664d04499c33660f897530e7daef0
-
SHA1
2c2383cc966eb320b368b964cc373128805d51b6
-
SHA256
dd578992950cc2254a965ef4b03203a145b196c3ce03ae7d493b47c77e4b2d77
-
SHA512
7de7fb53b65e30669ce6bd6e85f0889a8b9dad0d24854fa843b2e73dacfcd187f7fed19bf547bcbbf2ad11b03d86e33e96eb9f2992d0f3303fc980c1359113b6
-
SSDEEP
96:zkyqyyyyyyyyyPr5EyyyyyyyyyPMgSAiOAyqyyyyyyyyyP3yyyyyyyyyyPFqyyy3:z+gDUJsxgc
Malware Config
Signatures
Files
-
dd578992950cc2254a965ef4b03203a145b196c3ce03ae7d493b47c77e4b2d77.dll windows x86
a293388c9f21f69724bed6b86064785c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetCurrentProcessId
lstrcmpW
Module32First
GetModuleHandleA
Module32Next
CloseHandle
lstrcpyW
lstrlenW
GetModuleFileNameW
HeapAlloc
GetProcessHeap
WriteProcessMemory
GetCurrentProcess
VirtualProtect
IsBadStringPtrA
lstrcmpiA
SetMailslotInfo
user32
wsprintfW
SetMenu
CallNextHookEx
SetWindowsHookExA
advapi32
RegOpenKeyExW
Exports
Exports
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 414B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ