jkj
Static task
static1
Behavioral task
behavioral1
Sample
37b4b46e0da9fdd1a5a61f2c845b80a2051237f7d30e4db3cf0327f7b4aa1825.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
37b4b46e0da9fdd1a5a61f2c845b80a2051237f7d30e4db3cf0327f7b4aa1825.dll
Resource
win10v2004-20220901-en
General
-
Target
37b4b46e0da9fdd1a5a61f2c845b80a2051237f7d30e4db3cf0327f7b4aa1825
-
Size
72KB
-
MD5
04c8fa821a41136d56de04f7e55bfc00
-
SHA1
b301485bd189afd3642fa1921fceb9b7f4a9da53
-
SHA256
37b4b46e0da9fdd1a5a61f2c845b80a2051237f7d30e4db3cf0327f7b4aa1825
-
SHA512
37d72c663d207722dde1667223aa012af93fd966bfab5ba483dbbd44b02c41159e325c3eadc3978a7700ad3a03add7bb13359c37b6c259234062a1dea0e644c3
-
SSDEEP
1536:WUPMadZgQ24x/tCcgQFPvXGNRfWlAPClJO:WT8KQ2K/txrt2NNClJ
Malware Config
Signatures
Files
-
37b4b46e0da9fdd1a5a61f2c845b80a2051237f7d30e4db3cf0327f7b4aa1825.dll windows x86
68178e24b7b2307735ebde5d73dd2e4b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
Sleep
GetTickCount
GetFileAttributesA
CloseHandle
GetFileSize
CreateFileA
ReadFile
FindNextFileA
lstrcpyA
FindClose
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetProcAddress
LoadLibraryA
GetCurrentProcess
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
UnhandledExceptionFilter
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
VirtualFree
GetSystemInfo
HeapCreate
HeapDestroy
GetStartupInfoA
ExitProcess
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
user32
GetDesktopWindow
SetCursorPos
GetSystemMetrics
GetWindowLongA
SetWindowLongA
GetCursorPos
SetWindowTextA
SetWindowPos
SetForegroundWindow
SetFocus
SwitchToThisWindow
EnumWindows
GetWindowThreadProcessId
PostMessageA
ShowWindow
DestroyWindow
EnableWindow
GetWindowRect
EnumChildWindows
IsWindowVisible
GetClassNameA
IsWindowEnabled
GetWindowTextA
wsprintfA
SendInput
GetForegroundWindow
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetMalloc
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ