SetHook
Static task
static1
Behavioral task
behavioral1
Sample
916e49456116b20c7314c9d2238d99bdd8c3e3d55301732214bd3c75d40198e7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
916e49456116b20c7314c9d2238d99bdd8c3e3d55301732214bd3c75d40198e7.dll
Resource
win10v2004-20221111-en
General
-
Target
916e49456116b20c7314c9d2238d99bdd8c3e3d55301732214bd3c75d40198e7
-
Size
5KB
-
MD5
50a0aef2a54c246f71e19e6aeb67cc72
-
SHA1
903ed2695b809f7d75dde82112373f7fc3c9ad7b
-
SHA256
916e49456116b20c7314c9d2238d99bdd8c3e3d55301732214bd3c75d40198e7
-
SHA512
b77b2f65ecc307402dc74cd0796f2b56144c7ac7b727c86eb5a7c356fcfdf1b4f8e81c48caeffd7e0dbcce1bca619ab05503a6b2ae8e76bb2f46f6a401becdc0
-
SSDEEP
48:CtmZRq9+3bKcd5XuTIvqagetFVBmyjthgmRB7mo:h+8bzz97BJlb6
Malware Config
Signatures
Files
-
916e49456116b20c7314c9d2238d99bdd8c3e3d55301732214bd3c75d40198e7.dll windows x86
8da11984bd89c4972effc77dadc25c48
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
IsBadStringPtrA
lstrcmpiA
lstrlenW
lstrcpyW
CloseHandle
Module32Next
GetCurrentProcess
CreateToolhelp32Snapshot
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
HeapAlloc
GetProcessHeap
Module32First
WriteProcessMemory
user32
CallNextHookEx
SetWindowsHookExA
advapi32
RegOpenKeyExW
Exports
Exports
Sections
.text Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 819B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ