dmjnqxrfjf
Static task
static1
Behavioral task
behavioral1
Sample
82650093f875df7b3b3961ed9fdfbf902d7ebccca5669a19defb3879c804b968.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
82650093f875df7b3b3961ed9fdfbf902d7ebccca5669a19defb3879c804b968.dll
Resource
win10v2004-20221111-en
General
-
Target
82650093f875df7b3b3961ed9fdfbf902d7ebccca5669a19defb3879c804b968
-
Size
112KB
-
MD5
d38d426f27753e9789eac4ad0d1c6de0
-
SHA1
b6673f7136398f6992ce960445e4408b7197cd9f
-
SHA256
82650093f875df7b3b3961ed9fdfbf902d7ebccca5669a19defb3879c804b968
-
SHA512
37e4c3b53e4d28475611ce3bce5e6d712a18ab149a324d576b12f62e61ccbdd5a0857234494a147bfae1d6142117ae29bae3afc2e64158ecf992eaffe6a67c00
-
SSDEEP
3072:VvxtQZSXlqJu3XbW3+hX92+zHva29hJB:Vvxt0SINEVFv
Malware Config
Signatures
Files
-
82650093f875df7b3b3961ed9fdfbf902d7ebccca5669a19defb3879c804b968.dll windows x86
7cfdb47b75d5565fdbf186308c4b0616
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyW
RegOpenKeyExA
RegEnumValueW
RegFlushKey
version
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueA
kernel32
RtlUnwind
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
IsValidLocale
GetModuleHandleA
GetHandleInformation
VirtualAlloc
LoadLibraryW
InterlockedIncrement
SearchPathW
GetVersionExA
RaiseException
ExpandEnvironmentStringsA
SetHandleCount
GetTempFileNameW
GetModuleFileNameW
GetTickCount
GlobalUnlock
EnumSystemLocalesA
CreateProcessW
GetACP
GetProcessHeap
ReleaseMutex
GetTempFileNameA
GlobalReAlloc
WideCharToMultiByte
GetFileTime
GetLastError
VirtualQuery
GetStdHandle
InitializeCriticalSection
CompareStringA
CreateProcessA
CreateEventA
FormatMessageA
CreateEventW
GetStringTypeW
GetTempPathA
GetVersion
FindResourceW
WriteConsoleW
GetCurrentDirectoryW
lstrcpynA
SetEvent
FindResourceExW
SetStdHandle
GetCurrentDirectoryA
HeapCreate
GetCurrentThread
SetEndOfFile
InterlockedExchange
WriteFile
LocalAlloc
SetEnvironmentVariableA
CreateFileMappingA
HeapAlloc
GetCPInfo
SizeofResource
GetLocaleInfoW
GetFileType
HeapDestroy
GetStringTypeA
GetLocaleInfoA
lstrlenW
GetShortPathNameW
CloseHandle
lstrcpynW
SetFilePointer
LoadLibraryExW
ExitThread
CreateFileA
WaitForSingleObject
SetThreadPriority
HeapSize
GlobalAlloc
GetTempPathW
SetCurrentDirectoryA
LeaveCriticalSection
IsValidCodePage
CompareStringW
GetSystemInfo
InterlockedCompareExchange
QueryPerformanceCounter
ExitProcess
GetSystemTime
GetCommandLineA
EnterCriticalSection
VirtualFree
HeapFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
UnhandledExceptionFilter
GetOEMCP
FlushFileBuffers
ReadFile
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ