EnumTvValueNext
Static task
static1
Behavioral task
behavioral1
Sample
f692b07227646ff69e760245222975f4037ecfeabd8c707d9cc2781ccc5a9b31.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f692b07227646ff69e760245222975f4037ecfeabd8c707d9cc2781ccc5a9b31.dll
Resource
win10v2004-20221111-en
General
-
Target
f692b07227646ff69e760245222975f4037ecfeabd8c707d9cc2781ccc5a9b31
-
Size
371KB
-
MD5
c595656298f6eb88817a86f4f0c98ae2
-
SHA1
551069cacd1924a6eabec6521cc0a6a0512ac1d6
-
SHA256
f692b07227646ff69e760245222975f4037ecfeabd8c707d9cc2781ccc5a9b31
-
SHA512
8c571ab3d820f19d113eb088c4e11ea93ca452db36a4f749d593b7890da776759546cdc6d0b64ba512ac6417abaed9f2f0900f728869958bbc5c91d7b3a73401
-
SSDEEP
6144:WI+wXdeSAE6M3s+CspH1hzG1hlf1zkN3ss1EA1lirmtR2jpybHWapKNzofH03jfK:P7Aq3Gn1dXmliQ2Fyb2WiMH03jUY/pJL
Malware Config
Signatures
Files
-
f692b07227646ff69e760245222975f4037ecfeabd8c707d9cc2781ccc5a9b31.dll windows x86
5e7e827f2e700da5b964d8f462a86001
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
SetThreadPriority
CreateEventA
CreateMutexA
CloseHandle
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetModuleHandleA
GetVersionExA
Sleep
GetLocalTime
GetLastError
GetVersion
SetProcessWorkingSetSize
GetProcessWorkingSetSize
GetCurrentProcess
ResetEvent
VirtualAlloc
GetSystemInfo
AddAtomA
FindAtomA
DeleteAtom
WriteFile
SetFilePointer
ExitProcess
CreateThread
VirtualFree
SetLastError
SetErrorMode
QueryDosDeviceA
GetDriveTypeA
GetTimeZoneInformation
SetConsoleCtrlHandler
GetCurrentProcessId
SetEvent
FreeLibrary
ExitThread
WaitForSingleObject
ReleaseMutex
DeviceIoControl
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualLock
CreateFileA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
RtlUnwind
RaiseException
GetCommandLineA
HeapFree
FatalAppExitA
TerminateProcess
HeapReAlloc
HeapAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetCurrentThread
SetUnhandledExceptionFilter
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
FlushFileBuffers
IsBadWritePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
SetStdHandle
ReadFile
GetLocaleInfoW
user32
MessageBoxA
advapi32
MakeAbsoluteSD
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetFileSecurityA
Exports
Exports
Sections
.text Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 163KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ