Behavioral task
behavioral1
Sample
aa6d64e2c3ab80f4e1403968f9a06eef8c2a74d84e407c2dbda9b3a7a1562197.dll
Resource
win7-20220812-en
General
-
Target
aa6d64e2c3ab80f4e1403968f9a06eef8c2a74d84e407c2dbda9b3a7a1562197
-
Size
75KB
-
MD5
a4fcdebcda60b8a84bd12dd4026b4235
-
SHA1
e21bc4dfbba7bf07320ef076503e6a5276f760e5
-
SHA256
aa6d64e2c3ab80f4e1403968f9a06eef8c2a74d84e407c2dbda9b3a7a1562197
-
SHA512
23c5b35c3bd2d45cb3e47896c786c03ce30ccec21caaf42e858f4840ee08907804825d1b36909d7511bc3390d88e15ab005353f1f6b22aecdca6f94a190acd3d
-
SSDEEP
768:t/iS1ucXVJGcyqLq6yU1O4bDEJfBw6q2l0520QK+qz0TehSlqbEV7qxVRGKE2nah:tKSpquEUK6hSEQglPbQH7Orknj9sH0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aa6d64e2c3ab80f4e1403968f9a06eef8c2a74d84e407c2dbda9b3a7a1562197.dll windows x86
1d6c790c6d2d40a337eac3259912b469
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawMenuBar
DrawCaption
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyCaret
CreatePopupMenu
CreateDialogParamA
CreateCursor
CreateAcceleratorTableA
CopyRect
CloseWindow
CharUpperA
CharToOemBuffA
CharNextA
ActivateKeyboardLayout
kernel32
EnumResourceLanguagesW
lstrlenA
lstrcmpiA
lstrcmpA
lstrcatA
WriteFile
SleepEx
SetEndOfFile
ReadFile
LocalAlloc
LeaveCriticalSection
InitializeCriticalSection
GetVersion
GetPrivateProfileStringA
GetLocalTime
GetDateFormatA
FreeResource
CloseHandle
EnterCriticalSection
FlushFileBuffers
Sections
.text Size: 18KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ