fifzrlpuxfg
Static task
static1
Behavioral task
behavioral1
Sample
7f456cfa15d12e5ce45c9e1fe3553290120b6e1fe6162421c986c0f7b7a57c34.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f456cfa15d12e5ce45c9e1fe3553290120b6e1fe6162421c986c0f7b7a57c34.dll
Resource
win10v2004-20220901-en
General
-
Target
7f456cfa15d12e5ce45c9e1fe3553290120b6e1fe6162421c986c0f7b7a57c34
-
Size
87KB
-
MD5
acdcdeb01659b5a87f4a919fb091f4a0
-
SHA1
80d20f1aebcd209a1991e4cca5b5f37b1193dbb6
-
SHA256
7f456cfa15d12e5ce45c9e1fe3553290120b6e1fe6162421c986c0f7b7a57c34
-
SHA512
e2d841a7d7c7b1d4f9c37bdcd5c364c02e1ff74b96aee5490bfcb4e221c62e1c8c9f751b6efbfbdf9c043436ea55afd3b11c01ed56e4bab2fa933b9fe4db1e68
-
SSDEEP
1536:6mULtaIyx82mxbVQDwz2BoodRjKZcjhMi8GuUZ9WLurUvXI0L862kVCl7oE:wap82mO22tjKKhMYGLF123lME
Malware Config
Signatures
Files
-
7f456cfa15d12e5ce45c9e1fe3553290120b6e1fe6162421c986c0f7b7a57c34.dll windows x86
ae476b5c27739c531c97326508ce819f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeleteService
LookupPrivilegeNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetEntriesInAccessListW
ConvertSecurityDescriptorToAccessNamedA
kernel32
VirtualAlloc
CloseHandle
CreateMutexA
GetCurrentThreadId
GetLastError
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
ReleaseMutex
WaitForSingleObject
GetCommandLineW
LoadResource
FindResourceA
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableA
ole32
OleSetMenuDescriptor
UtGetDvtd32Info
rpcrt4
NdrMesTypeDecode2
RpcSmGetThreadHandle
RpcStringFreeW
user32
MessageBoxExA
SetWindowPlacement
CharUpperW
Exports
Exports
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ