NUJOMG
Static task
static1
Behavioral task
behavioral1
Sample
86cce1eb1fdd42ee65f93f69b9575c0f488eb5ccc4a3a76d47fbc750ad4e8f42.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86cce1eb1fdd42ee65f93f69b9575c0f488eb5ccc4a3a76d47fbc750ad4e8f42.dll
Resource
win10v2004-20221111-en
General
-
Target
86cce1eb1fdd42ee65f93f69b9575c0f488eb5ccc4a3a76d47fbc750ad4e8f42
-
Size
87KB
-
MD5
e448094c629758722a592cc40578e2d0
-
SHA1
9b06df577fb64fc3f4f5b75037b98c7bef2020c3
-
SHA256
86cce1eb1fdd42ee65f93f69b9575c0f488eb5ccc4a3a76d47fbc750ad4e8f42
-
SHA512
7eb356dfadb79c617ffa99d6be193e9dd83f677306902d34506eab1382884196e840d6e8c6883c423598ff6755f4541acb10ca9e3553cc970de925364c86c700
-
SSDEEP
1536:mXStHaQyt8yavK2zbQDwLYXw9MxL7DBQPIZzJc1ezHrU4GHakmCCl3:zad8yavw6YNL3BQPoK1P6Bl3
Malware Config
Signatures
Files
-
86cce1eb1fdd42ee65f93f69b9575c0f488eb5ccc4a3a76d47fbc750ad4e8f42.dll windows x86
ae476b5c27739c531c97326508ce819f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeleteService
LookupPrivilegeNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetEntriesInAccessListW
ConvertSecurityDescriptorToAccessNamedA
kernel32
VirtualAlloc
CloseHandle
CreateMutexA
GetCurrentThreadId
GetLastError
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
ReleaseMutex
WaitForSingleObject
GetCommandLineW
LoadResource
FindResourceA
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableA
ole32
OleSetMenuDescriptor
UtGetDvtd32Info
rpcrt4
NdrMesTypeDecode2
RpcSmGetThreadHandle
RpcStringFreeW
user32
MessageBoxExA
SetWindowPlacement
CharUpperW
Exports
Exports
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ