Static task
static1
Behavioral task
behavioral1
Sample
ff29d31854aa05840b70a11641f5121cc947c4ea49748bd21735ea18611674d3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ff29d31854aa05840b70a11641f5121cc947c4ea49748bd21735ea18611674d3.dll
Resource
win10v2004-20221111-en
General
-
Target
ff29d31854aa05840b70a11641f5121cc947c4ea49748bd21735ea18611674d3
-
Size
288KB
-
MD5
c4fb031214376df34ff8f20b6421508b
-
SHA1
a6e1ac18a22570d7114c78128e44a8f051e4f069
-
SHA256
ff29d31854aa05840b70a11641f5121cc947c4ea49748bd21735ea18611674d3
-
SHA512
39b4a34780200e5f6e8d2b43433cf8523c932deacb1a92f3049b92d8a17b39240e4ef2f94ebc1c6ddbde4276b6e13db37fc2d1d229e078361b3cf859ec60264f
-
SSDEEP
6144:PZrRwb68l3y3EUbVJixFcz5WQpGkNL8y9+hA:Brl8lwE8b7pnNFEA
Malware Config
Signatures
Files
-
ff29d31854aa05840b70a11641f5121cc947c4ea49748bd21735ea18611674d3.dll windows x86
e71879711d6a09252fa331d4160e5f8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetSystemTime
Sleep
WaitForSingleObject
CreateEventW
CreateThread
MultiByteToWideChar
MoveFileW
GetModuleFileNameW
GetTempPathW
CloseHandle
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
SetFileTime
WriteFile
LoadLibraryW
GetProcAddress
FindFirstFileW
SetFilePointer
FindClose
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
FindNextFileW
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetTimeZoneInformation
SetEndOfFile
CreateFileA
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
Sections
.text Size: 260KB - Virtual size: 258KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ