DllCanUnloadNow
Static task
static1
Behavioral task
behavioral1
Sample
a2174bc2f04feed33dfd98f8bd7ba6fe103331e84b43845a318777908ab528e4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2174bc2f04feed33dfd98f8bd7ba6fe103331e84b43845a318777908ab528e4.dll
Resource
win10v2004-20220812-en
General
-
Target
a2174bc2f04feed33dfd98f8bd7ba6fe103331e84b43845a318777908ab528e4
-
Size
12KB
-
MD5
a50544f11e91dc9bf423e2841ff0d560
-
SHA1
395475192a386cf2c153012de926e5072b066816
-
SHA256
a2174bc2f04feed33dfd98f8bd7ba6fe103331e84b43845a318777908ab528e4
-
SHA512
c38fa4afad461db1822bf1eb7e34f6a106b883e32be235312645661a83c32e0df00689449bd03a2499ebe8d69814a5471db60790fa93535ab5833287e401acc0
-
SSDEEP
192:wB0QW3h6M5dIP3AS3qu8WtCpNgWkhye0wpvl7EOGNGGAep3ajjsYq/093H:+qhJdIISqutCpgye7vWGGAWajIYl
Malware Config
Signatures
Files
-
a2174bc2f04feed33dfd98f8bd7ba6fe103331e84b43845a318777908ab528e4.dll windows x86
26ebb87b7e3ed963ae35a9718688a4e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
HeapCreate
DisableThreadLibraryCalls
FlushInstructionCache
VirtualAlloc
ReadProcessMemory
VirtualProtect
IsBadCodePtr
GetCurrentProcess
GetProcAddress
LoadLibraryA
HeapFree
CloseHandle
ReadFile
HeapAlloc
GetFileSize
CreateFileA
lstrlenA
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ