Static task
static1
Behavioral task
behavioral1
Sample
ec6fda25e193dbc0c2e0330a666015308daa079ec526101f63aec47889fb9fd9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec6fda25e193dbc0c2e0330a666015308daa079ec526101f63aec47889fb9fd9.dll
Resource
win10v2004-20220812-en
General
-
Target
ec6fda25e193dbc0c2e0330a666015308daa079ec526101f63aec47889fb9fd9
-
Size
146KB
-
MD5
af7892e50f7eb8d230c5b1babf40bf10
-
SHA1
4f75cde98a85f8d335440e769e1588c64b53fc63
-
SHA256
ec6fda25e193dbc0c2e0330a666015308daa079ec526101f63aec47889fb9fd9
-
SHA512
bf1f585938eaefde25b7eaa74144e441f1f975589a2a9945fe5e3fb676f65efb219a7343baa7808d77a38ca0206fcd5961470796f2d0c3a4d9eedc43ecbcadae
-
SSDEEP
3072:1+sI6Tr0Lu+QYIVnEcmAeHeC1J7KxG7kQba6zPSR61mHpL:NLMLu+QLVnEcmAe+8J7UOkQbaK664
Malware Config
Signatures
Files
-
ec6fda25e193dbc0c2e0330a666015308daa079ec526101f63aec47889fb9fd9.dll windows x86
e5b86d0ba4241b9c30f1943dbaa56ae9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
GetDllDirectoryA
MoveFileExA
VirtualAlloc
GetConsoleAliasExesW
GetCurrentDirectoryA
GetProcessWorkingSetSize
PeekConsoleInputA
GetDefaultCommConfigA
IsSystemResumeAutomatic
FindAtomA
FindFirstVolumeMountPointA
UpdateResourceA
GetCommTimeouts
Module32Next
SetThreadExecutionState
SizeofResource
ExitVDM
SetEnvironmentVariableA
WriteConsoleInputA
SetConsoleOutputCP
IsBadStringPtrA
EnumResourceLanguagesA
SetConsoleCursorInfo
GetCommMask
WriteConsoleOutputCharacterW
GetConsoleCursorMode
GetConsoleTitleA
CreateSemaphoreA
SetErrorMode
GetConsoleAliasesLengthA
HeapFree
CancelTimerQueueTimer
CreateSocketHandle
IsProcessorFeaturePresent
SetDefaultCommConfigA
DefineDosDeviceA
GetSystemWindowsDirectoryA
GetPrivateProfileSectionNamesA
SetComputerNameA
OpenProcess
GetFileInformationByHandle
GetProcessAffinityMask
lstrlenA
GlobalMemoryStatusEx
FatalExit
WaitNamedPipeA
GetLocalTime
CopyFileA
GetComputerNameA
WriteConsoleOutputCharacterW
GetBinaryTypeA
WriteConsoleOutputCharacterW
OpenProcess
GlobalUnWire
GetLogicalDriveStringsA
SetCalendarInfoA
LoadResource
UnregisterWaitEx
EnumTimeFormatsA
WriteConsoleOutputA
CommConfigDialogA
SetComputerNameExA
GetComputerNameA
IsBadStringPtrA
GetUserDefaultUILanguage
PurgeComm
MapUserPhysicalPagesScatter
LZOpenFileA
VirtualAlloc
GetFileSizeEx
GetBinaryTypeA
WaitForMultipleObjects
OpenFileMappingA
GlobalHandle
GetBinaryType
SetFileAttributesA
GetLastError
OpenProcess
SleepEx
AddAtomA
GetFileInformationByHandle
GetEnvironmentStringsA
GetProcessPriorityBoost
GetConsoleKeyboardLayoutNameA
IsBadStringPtrA
FindNextVolumeMountPointW
CallNamedPipeA
HeapQueryInformation
SetLocaleInfoA
GetFileSizeEx
FindNextVolumeA
GetVersionExA
GetThreadPriority
FindNextVolumeMountPointA
SetConsoleDisplayMode
HeapUnlock
GlobalAlloc
SetConsoleNumberOfCommandsA
TransactNamedPipe
OpenJobObjectA
advapi32
EncryptionDisable
dpnet
DirectPlay8Create
d3d8thk
OsThunkD3dContextCreate
crtdll
_CIcos
_CIsin
opengl32
glRasterPos2i
d3d8
Direct3DCreate8
user32
GetTabbedTextExtentA
UpdateLayeredWindow
SendIMEMessageExA
MenuWindowProcA
GetWindowPlacement
GetClipboardData
ChangeDisplaySettingsExA
DrawCaptionTempA
DlgDirSelectExA
MapVirtualKeyExW
ReplyMessage
GetKeyboardState
CharToOemBuffW
RegisterClassExW
SetWindowsHookExW
TranslateAccelerator
EndTask
MapVirtualKeyExA
CharPrevExA
ShowWindowAsync
EnumChildWindows
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ