oikonsievsi
Static task
static1
Behavioral task
behavioral1
Sample
50bf98623d1e64afcff64ee06e4f366fa3c81021c293b413b9f29931019e622a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50bf98623d1e64afcff64ee06e4f366fa3c81021c293b413b9f29931019e622a.dll
Resource
win10v2004-20220812-en
General
-
Target
50bf98623d1e64afcff64ee06e4f366fa3c81021c293b413b9f29931019e622a
-
Size
100KB
-
MD5
4f16b75093346b2d49a7baaf4f3e23d0
-
SHA1
3adced5ecd2a1c2395dbffda3ea388b8772ab8a0
-
SHA256
50bf98623d1e64afcff64ee06e4f366fa3c81021c293b413b9f29931019e622a
-
SHA512
c2db13a2203647d6681911cadda28cacee73f35f4a613aef0a00ed87e4d7fb96e07f4999df6b9b5f81e92a42391d460bd44489bb4cda84fc2b9a1a6fa43bfb7b
-
SSDEEP
1536:3oMM6oTjE60Gs60BIZGOMyORKG2aY3SEgXRGXZnckFDJSKsew+k/ISEEHmI615:3oTT1s6YI5MyO83S0ncODJSgLkzHmI
Malware Config
Signatures
Files
-
50bf98623d1e64afcff64ee06e4f366fa3c81021c293b413b9f29931019e622a.dll windows x86
d301ac8b61b046cfeb01a7b526ae8963
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AccessCheck
BuildImpersonateExplicitAccessWithNameA
LookupPrivilegeDisplayNameW
OpenThreadToken
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
RegQueryValueExW
gdi32
ExtEscape
AddFontResourceExA
kernel32
CloseHandle
CreateThread
EnterCriticalSection
GetConsoleWindow
GetCurrentThread
GetLastError
GetStartupInfoA
HeapFree
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
lstrcpyW
lstrlenW
VirtualAlloc
LoadResource
FindResourceA
CreateFileMappingW
FindClose
FindFirstFileW
GetCurrentThreadId
LocalAlloc
LocalFree
MapViewOfFile
UnmapViewOfFile
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
HeapSize
LoadLibraryA
VirtualQuery
InterlockedExchange
SetEnvironmentVariableA
RtlUnwind
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
FatalAppExitA
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
ole32
HDC_UserUnmarshal
CoTaskMemAlloc
HGLOBAL_UserMarshal
rpcrt4
MesDecodeBufferHandleCreate
RpcImpersonateClient
RpcRevertToSelf
RpcServerInqDefaultPrincNameW
RpcServerRegisterAuthInfoW
RpcServerRegisterIfEx
RpcBindingFree
user32
GetWindowLongW
GetWindowLongA
GetDlgItem
GetWindowThreadProcessId
DefWindowProcW
CallWindowProcW
DlgDirSelectComboBoxExW
LoadStringW
MessageBoxW
PeekMessageW
SendMessageW
SendNotifyMessageW
SetWindowLongW
DispatchMessageW
SetWindowTextW
Exports
Exports
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ