pfhj
Static task
static1
Behavioral task
behavioral1
Sample
cb51c336ada6ccf87b752037c03cc646d3db5e5fed1bd06868766968b2a44dd8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb51c336ada6ccf87b752037c03cc646d3db5e5fed1bd06868766968b2a44dd8.dll
Resource
win10v2004-20221111-en
General
-
Target
cb51c336ada6ccf87b752037c03cc646d3db5e5fed1bd06868766968b2a44dd8
-
Size
94KB
-
MD5
b31a7602b8fdbf331deff087d7d633a0
-
SHA1
3ef3f0848f26b700b58ab9a48df44bf4847db091
-
SHA256
cb51c336ada6ccf87b752037c03cc646d3db5e5fed1bd06868766968b2a44dd8
-
SHA512
d33adf70f8c346548ebeb0494a2abb4d8f7e47703a8067f2a21f5555c846191795a87694d54b269c556fd6ca4d7e7d6164d3cd9bd90219c53af01bc7072a351a
-
SSDEEP
1536:eHeC5TGtDi/75pPOxMoGnU4U11jXv5xOHIsH6QT8cL+QI:eHJlGte/ol11bRxOS4/
Malware Config
Signatures
Files
-
cb51c336ada6ccf87b752037c03cc646d3db5e5fed1bd06868766968b2a44dd8.dll windows x86
e34f96db011b3828dfc7c568c0687e02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Beep
OpenProcess
GetCurrentProcessId
lstrcmpA
MulDiv
LocalFree
Sleep
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
TerminateThread
WaitForSingleObject
CreateThread
CloseHandle
GetLocaleInfoA
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
HeapAlloc
GetProcessHeap
HeapFree
EnumCalendarInfoExA
ResumeThread
SetThreadPriority
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ