Static task
static1
Behavioral task
behavioral1
Sample
a04c103832ea749b5d0121b7ff8011e1f2b71fb3465043d14c5b5f26c32f59db.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a04c103832ea749b5d0121b7ff8011e1f2b71fb3465043d14c5b5f26c32f59db.dll
Resource
win10v2004-20220812-en
General
-
Target
a04c103832ea749b5d0121b7ff8011e1f2b71fb3465043d14c5b5f26c32f59db
-
Size
240KB
-
MD5
662270ee17c2fa93d2ae2c3b02247970
-
SHA1
5d8010351efe84c7f03cf59c1d0f1a38224a1dac
-
SHA256
a04c103832ea749b5d0121b7ff8011e1f2b71fb3465043d14c5b5f26c32f59db
-
SHA512
508bffb02ba6cd493ee91c592150af089c1e6a235f697c6a4023868a947ccee7e1bc34e17ccfaf3b8e57cd57c1e59139214dba5378024350a4b58bfc088708ec
-
SSDEEP
3072:CIRXnzFkXZvRxTYDqZSzH6i5vFDsjBnxQTuGZu/Dttb3Z95tAA5lI5:CIR3zFkXtzJOD4nYuj/bUF
Malware Config
Signatures
Files
-
a04c103832ea749b5d0121b7ff8011e1f2b71fb3465043d14c5b5f26c32f59db.dll windows x86
e1db804d35943c82fb3d58f3531cf9d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetTempFileNameW
GetWindowsDirectoryW
FindClose
FindFirstFileW
CopyFileW
GetProcAddress
LoadLibraryW
CreateProcessW
GetLastError
MultiByteToWideChar
GetTempPathW
SetFilePointer
SystemTimeToFileTime
WaitForSingleObject
ReadFile
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
GetCurrentDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetModuleFileNameW
CreateFileW
WriteFile
CloseHandle
lstrcpynW
GetTickCount
GetFileAttributesW
GetSystemTime
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
GetWindowTextW
IsWindowVisible
GetWindow
EnumWindows
SetForegroundWindow
MessageBoxW
GetDesktopWindow
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
shell32
ShellExecuteW
ole32
CoInitialize
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitializeEx
shlwapi
SHDeleteKeyW
Sections
.text Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ