Static task
static1
Behavioral task
behavioral1
Sample
949ff673fa124f7110f09ff7e4815943441ba049418a1e77d5c2a15c1d105873.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
949ff673fa124f7110f09ff7e4815943441ba049418a1e77d5c2a15c1d105873.dll
Resource
win10v2004-20220901-en
General
-
Target
949ff673fa124f7110f09ff7e4815943441ba049418a1e77d5c2a15c1d105873
-
Size
133KB
-
MD5
f982b1f6a0e9d04385f0af95b152c2a6
-
SHA1
b169a7ffcc267fe0d36c907ade611cc7b88f693e
-
SHA256
949ff673fa124f7110f09ff7e4815943441ba049418a1e77d5c2a15c1d105873
-
SHA512
21b85279e5162a8ee1152427bc21b02dcdb91fdd09a6a1176e68268b63e44f2adde0c01ba5836bf0de53edd6bb5c3d53a9bacb1411ffa3da27748324295eb706
-
SSDEEP
3072:EQknHMd2OSKmEQalq33wZQ55Yqn/FehEbhcYHzcfxhxrx+:0nsYOSKmEjlu3wZmb/FXhcY1
Malware Config
Signatures
Files
-
949ff673fa124f7110f09ff7e4815943441ba049418a1e77d5c2a15c1d105873.dll windows x86
51f7fb1d4813a3d64b7d6c2de77d9bb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcessHeap
HeapAlloc
InterlockedIncrement
GetComputerNameW
InterlockedDecrement
DeviceIoControl
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LocalReAlloc
InitializeCriticalSection
CompareFileTime
SetEvent
GetSystemTimeAsFileTime
CreateEventW
GetModuleFileNameW
IsBadReadPtr
ReadFileEx
GetModuleHandleA
MulDiv
WaitForMultipleObjects
ResetEvent
GetModuleHandleW
CreateFileMappingW
MapViewOfFile
VirtualQuery
Sleep
DisableThreadLibraryCalls
CreateMutexW
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
CreateMailslotW
CreateFileW
WriteFile
ReadFile
CreateThread
InterlockedCompareExchange
InterlockedExchange
CloseHandle
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
lstrlenW
lstrlenA
LocalAlloc
LocalFree
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FreeResource
ReleaseMutex
TlsSetValue
TlsGetValue
GetCurrentThreadId
WaitForSingleObject
GetVersion
GetCommandLineA
GetTickCount
GetCurrentProcessId
VirtualProtect
user32
MapWindowPoints
GetWindowRect
SetFocus
GetPropW
CallWindowProcW
RemovePropW
GetWindowLongW
SendMessageW
SetPropW
GetSystemMetrics
ClientToScreen
SendDlgItemMessageW
GetDC
GetDlgItem
SetWindowLongW
DestroyIcon
GetUpdateRect
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
CheckDlgButton
wsprintfW
PostMessageW
SetWindowPos
SetWindowTextW
ShowWindow
EnableWindow
GetSysColorBrush
CheckRadioButton
InvalidateRect
ReleaseDC
GetClientRect
EndDialog
SetCursor
LoadCursorW
GetFocus
FillRect
GetSysColor
LoadStringW
InflateRect
LoadImageW
GetParent
advapi32
RegOpenKeyExA
RegQueryValueExA
CheckTokenMembership
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyW
CloseServiceHandle
gdi32
DeleteObject
GetTextExtentPointW
TextOutW
DeleteDC
IntersectClipRect
SetBkColor
SetTextAlign
SetTextColor
MoveToEx
SetDIBitsToDevice
GetBitmapBits
GetObjectW
SetStretchBltMode
BitBlt
Polyline
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetBkMode
StretchDIBits
ole32
CoUninitialize
CoInitialize
rpcrt4
RpcStringFreeW
NdrClientCall2
RpcSmDestroyClientContext
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcMgmtSetComTimeout
RpcEpResolveBinding
RpcBindingSetAuthInfoExW
RpcMgmtInqServerPrincNameW
msvcrt
__CxxFrameHandler
_except_handler3
qsort
memset
_vsnwprintf
memcpy
rand
_adjust_fdiv
_wcsdup
wcstok
free
_wcsicmp
wcschr
srand
_amsg_exit
_initterm
_XcptFilter
memmove
malloc
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ