Static task
static1
Behavioral task
behavioral1
Sample
cdfa30a6898dde6074fe2155e073b64d311d72c698448ad2acaae5aaeae7a9b2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdfa30a6898dde6074fe2155e073b64d311d72c698448ad2acaae5aaeae7a9b2.dll
Resource
win10v2004-20220812-en
General
-
Target
cdfa30a6898dde6074fe2155e073b64d311d72c698448ad2acaae5aaeae7a9b2
-
Size
112KB
-
MD5
b2b5922a6bb15f39dc6612be6d840c58
-
SHA1
1cfb84ad7efb069b04ee24788011cf1fc6c0b594
-
SHA256
cdfa30a6898dde6074fe2155e073b64d311d72c698448ad2acaae5aaeae7a9b2
-
SHA512
6649c8db59bf9dfd38a3040f95d95e209f83f158412cee6f30ba1b091eefaaf1199313cfbffba71b9729d996437d905f7a1f065445b95b5c36ba011302d8ec9a
-
SSDEEP
3072:JN52vjokg/XD4Sm+rq2R5izdRZ3f0cXNcJybiofja2nColg:nhvD4SF7izdLv0cXNVb82C
Malware Config
Signatures
Files
-
cdfa30a6898dde6074fe2155e073b64d311d72c698448ad2acaae5aaeae7a9b2.dll windows x86
e2e010799ac3f69ea7928df66eed5cdf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ole32
StgPropertyLengthAsVariant
PropVariantClear
IsEqualGUID
winmm
waveInGetDevCapsA
timeKillEvent
timeBeginPeriod
mod32Message
waveInStart
midiOutSetVolume
midiInStart
WOW32DriverCallback
PlaySoundW
waveOutRestart
waveOutUnprepareHeader
mmioInstallIOProcA
advapi32
LsaSetInformationTrustedDomain
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaRemoveAccountRights
LookupPrivilegeNameW
I_ScSetServiceBitsA
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
FileEncryptionStatusA
CancelOverlappedAccess
BuildExplicitAccessWithNameW
AddAccessDeniedAce
user32
TranslateMessage
UpdateWindow
ShowWindow
SetUserObjectSecurity
SetSystemCursor
SetRect
RemoveMenu
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
GetForegroundWindow
GetCaretPos
EnumPropsA
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerW
CharLowerBuffA
BeginDeferWindowPos
EmptyClipboard
kernel32
GetVersionExA
HeapCreate
MulDiv
OpenEventW
OpenJobObjectW
ReadFile
HeapAlloc
SetFileTime
TlsGetValue
WaitForMultipleObjectsEx
lstrcmpA
GetTimeZoneInformation
SetEnvironmentVariableA
GlobalAddAtomA
CreateSemaphoreA
CloseHandle
BindIoCompletionCallback
GetWindowsDirectoryA
GetTempPathW
GetSystemInfo
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
GetModuleHandleA
GetFileAttributesExA
GetCurrentProcessId
DeleteCriticalSection
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
FindAtomA
ExitProcess
EnumTimeFormatsA
DuplicateHandle
Beep
ws2_32
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAUnhookBlockingHook
WSAGetLastError
dinput
DirectInputCreateW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ