Static task
static1
Behavioral task
behavioral1
Sample
c2f846e094adff75d54f4d31986842fbc25ba215ce8407d234464b3f759b851d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2f846e094adff75d54f4d31986842fbc25ba215ce8407d234464b3f759b851d.dll
Resource
win10v2004-20220812-en
General
-
Target
c2f846e094adff75d54f4d31986842fbc25ba215ce8407d234464b3f759b851d
-
Size
90KB
-
MD5
8b907e5b2ca2d7fd5388bd308e95c823
-
SHA1
a0b68400be05974199e3567c02a162728d19f909
-
SHA256
c2f846e094adff75d54f4d31986842fbc25ba215ce8407d234464b3f759b851d
-
SHA512
cbe094a747e836e6db26e4934ae368971bba304b3cb41a54269012702397e037e10d13dca1245c52254c4dc1a44045ff893b8e7673972c73f9ef63e58e50c8f7
-
SSDEEP
1536:gpr7U/BfbvkEr0kVKSCNuBeQTXrcuLwwqJjpx5FNta2yp6e/+8LTcwkk:gV7ojvvVtVBeEXAuLwDFFNtDyceW8HV5
Malware Config
Signatures
Files
-
c2f846e094adff75d54f4d31986842fbc25ba215ce8407d234464b3f759b851d.dll windows x86
80c19e36dd5d0c5410c6d8b706d39dca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CreateServiceA
FreeSid
GetTokenInformation
GetUserNameA
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
DeleteAtom
DeleteFileA
DeviceIoControl
DisableThreadLibraryCalls
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
GetComputerNameA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetFullPathNameA
GetLastError
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcAddress
GetShortPathNameA
GetStdHandle
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempPathA
GetThreadTimes
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalHandle
HeapAlloc
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsBadWritePtr
IsValidCodePage
LCMapStringA
LeaveCriticalSection
LoadLibraryA
Module32Next
OpenProcess
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
SearchPathA
SetEndOfFile
SetErrorMode
SetFileTime
SetHandleCount
SetPriorityClass
SetStdHandle
SetThreadPriority
SizeofResource
Sleep
TerminateProcess
TlsAlloc
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
WideCharToMultiByte
WriteConsoleA
WritePrivateProfileStringA
lstrcatA
lstrlenA
ole32
CLSIDFromProgID
CoGetMalloc
CoInitializeEx
CoRevokeClassObject
CreateBindCtx
OleLoadFromStream
user32
CheckMenuItem
CreateDialogParamA
DispatchMessageA
EnableMenuItem
GetActiveWindow
GetAsyncKeyState
GetDC
GetMessageA
GetProcessWindowStation
GetSystemMenu
GetWindowLongA
IntersectRect
IsWindow
IsWindowVisible
LoadIconA
MessageBoxA
OffsetRect
PeekMessageA
PostQuitMessage
RegisterClassA
RegisterClipboardFormatA
ReleaseDC
SendMessageA
SetForegroundWindow
SetTimer
SetWindowRgn
ShowWindow
SystemParametersInfoA
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 44KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ