Lkhj
Static task
static1
Behavioral task
behavioral1
Sample
be1271e17d5199a7f20bc6d1c2d448835037ef67fb519c0f91504d30e2b774bc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
be1271e17d5199a7f20bc6d1c2d448835037ef67fb519c0f91504d30e2b774bc.dll
Resource
win10v2004-20220901-en
General
-
Target
be1271e17d5199a7f20bc6d1c2d448835037ef67fb519c0f91504d30e2b774bc
-
Size
87KB
-
MD5
1200c38d0342920bb03ee0ed34dfa5a0
-
SHA1
6cdaa18b36151a694166957725dcabd3e9c33f87
-
SHA256
be1271e17d5199a7f20bc6d1c2d448835037ef67fb519c0f91504d30e2b774bc
-
SHA512
1f6052977799b90c9a752a658b1cd5ba95efcd32bf3293762bae94b548c083952990a8248e111a88d0a9986a0d06e1d97f04db00a2df469822ed5a3b2bb92851
-
SSDEEP
1536:1uMiMqHa2yt8y2J/JbQDwLYVw2t5rzxfy8plKDElg/yjHakmCClBo:11kaP8y2Jw6YLr083iEl6Blu
Malware Config
Signatures
Files
-
be1271e17d5199a7f20bc6d1c2d448835037ef67fb519c0f91504d30e2b774bc.dll windows x86
ae476b5c27739c531c97326508ce819f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeleteService
LookupPrivilegeNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetEntriesInAccessListW
ConvertSecurityDescriptorToAccessNamedA
kernel32
VirtualAlloc
CloseHandle
CreateMutexA
GetCurrentThreadId
GetLastError
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
ReleaseMutex
WaitForSingleObject
GetCommandLineW
LoadResource
FindResourceA
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableA
ole32
OleSetMenuDescriptor
UtGetDvtd32Info
rpcrt4
NdrMesTypeDecode2
RpcSmGetThreadHandle
RpcStringFreeW
user32
MessageBoxExA
SetWindowPlacement
CharUpperW
Exports
Exports
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ