Static task
static1
Behavioral task
behavioral1
Sample
e8d6aa7bbe979cb3f5416290057f7f66c673b0ee41723b311e2f407909ccd1bc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8d6aa7bbe979cb3f5416290057f7f66c673b0ee41723b311e2f407909ccd1bc.dll
Resource
win10v2004-20220901-en
General
-
Target
e8d6aa7bbe979cb3f5416290057f7f66c673b0ee41723b311e2f407909ccd1bc
-
Size
133KB
-
MD5
7fc41f518306fe497e4ef97795b797ea
-
SHA1
6c020a638df02fff07ecbd73ba87f5f3f364dc34
-
SHA256
e8d6aa7bbe979cb3f5416290057f7f66c673b0ee41723b311e2f407909ccd1bc
-
SHA512
e52e0e3942916db52009660e10e13ec246ac934bb88c230587732a376fd311764e1ecdfdba10a21b2ee626cb507ff2c0d109642a2f6be9e6250136a3b0bd2798
-
SSDEEP
3072:hQknHMdmOSKmE9alq3JwZQ55c7Nqs/FZhEbNcYozcfxhxrx+:pns0OSKmEsluJwZmK5/FMNcYe
Malware Config
Signatures
Files
-
e8d6aa7bbe979cb3f5416290057f7f66c673b0ee41723b311e2f407909ccd1bc.dll windows x86
51f7fb1d4813a3d64b7d6c2de77d9bb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcessHeap
HeapAlloc
InterlockedIncrement
GetComputerNameW
InterlockedDecrement
DeviceIoControl
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LocalReAlloc
InitializeCriticalSection
CompareFileTime
SetEvent
GetSystemTimeAsFileTime
CreateEventW
GetModuleFileNameW
IsBadReadPtr
ReadFileEx
GetModuleHandleA
MulDiv
WaitForMultipleObjects
ResetEvent
GetModuleHandleW
CreateFileMappingW
MapViewOfFile
VirtualQuery
Sleep
DisableThreadLibraryCalls
CreateMutexW
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
CreateMailslotW
CreateFileW
WriteFile
ReadFile
CreateThread
InterlockedCompareExchange
InterlockedExchange
CloseHandle
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
lstrlenW
lstrlenA
LocalAlloc
LocalFree
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FreeResource
ReleaseMutex
TlsSetValue
TlsGetValue
GetCurrentThreadId
WaitForSingleObject
GetVersion
GetCommandLineA
GetTickCount
GetCurrentProcessId
VirtualProtect
user32
MapWindowPoints
GetWindowRect
SetFocus
GetPropW
CallWindowProcW
RemovePropW
GetWindowLongW
SendMessageW
SetPropW
GetSystemMetrics
ClientToScreen
SendDlgItemMessageW
GetDC
GetDlgItem
SetWindowLongW
DestroyIcon
GetUpdateRect
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
CheckDlgButton
wsprintfW
PostMessageW
SetWindowPos
SetWindowTextW
ShowWindow
EnableWindow
GetSysColorBrush
CheckRadioButton
InvalidateRect
ReleaseDC
GetClientRect
EndDialog
SetCursor
LoadCursorW
GetFocus
FillRect
GetSysColor
LoadStringW
InflateRect
LoadImageW
GetParent
advapi32
RegOpenKeyExA
RegQueryValueExA
CheckTokenMembership
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyW
CloseServiceHandle
gdi32
DeleteObject
GetTextExtentPointW
TextOutW
DeleteDC
IntersectClipRect
SetBkColor
SetTextAlign
SetTextColor
MoveToEx
SetDIBitsToDevice
GetBitmapBits
GetObjectW
SetStretchBltMode
BitBlt
Polyline
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetBkMode
StretchDIBits
ole32
CoUninitialize
CoInitialize
rpcrt4
RpcStringFreeW
NdrClientCall2
RpcSmDestroyClientContext
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcMgmtSetComTimeout
RpcEpResolveBinding
RpcBindingSetAuthInfoExW
RpcMgmtInqServerPrincNameW
msvcrt
__CxxFrameHandler
_except_handler3
qsort
memset
_vsnwprintf
memcpy
rand
_adjust_fdiv
_wcsdup
wcstok
free
_wcsicmp
wcschr
srand
_amsg_exit
_initterm
_XcptFilter
memmove
malloc
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ