Static task
static1
Behavioral task
behavioral1
Sample
a020b5351487335d6032f144851f2dfa31aefeeaae11b050e26970e971a11d3c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a020b5351487335d6032f144851f2dfa31aefeeaae11b050e26970e971a11d3c.dll
Resource
win10v2004-20220812-en
General
-
Target
a020b5351487335d6032f144851f2dfa31aefeeaae11b050e26970e971a11d3c
-
Size
42KB
-
MD5
5cb63fbe635f50eb0e06f9ee487fe4ed
-
SHA1
d28730f41fc69f3e167aab3c446a4f4a4ecb2451
-
SHA256
a020b5351487335d6032f144851f2dfa31aefeeaae11b050e26970e971a11d3c
-
SHA512
0b7ebc7f4c3776ba38093f538c0257cc55dffabb4cd34a487ddf01afe805538d527f749eaf7a8d5ab560260b59437cb3a4f9aa08c12ef0598c0048d2b8ff43bf
-
SSDEEP
768:DKEbwhJeyHhVI1AhsFq1LndulMUnRTZgtm9HfQRn46hWqxymV1o9U:WEbwhrzoJy4ZZzu4lyo
Malware Config
Signatures
Files
-
a020b5351487335d6032f144851f2dfa31aefeeaae11b050e26970e971a11d3c.dll windows x86
05fc2611dc4bfe9bbdf6f8ae3291c581
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetStringTypeW
GetStringTypeA
GetCurrentThreadId
GetTickCount
GetSystemTimeAsFileTime
GetProcAddress
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
RtlUnwind
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ole32
CoUninitialize
CoTaskMemAlloc
CoInitialize
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ