ppjyiyfcv
Static task
static1
Behavioral task
behavioral1
Sample
f6e50d4d6f51004ea71e6f62976d376e9fb6c6a053e84a69075901664e4ab98e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f6e50d4d6f51004ea71e6f62976d376e9fb6c6a053e84a69075901664e4ab98e.dll
Resource
win10v2004-20221111-en
General
-
Target
f6e50d4d6f51004ea71e6f62976d376e9fb6c6a053e84a69075901664e4ab98e
-
Size
92KB
-
MD5
0a104a5f73d81d9df0fb8a3bfe19dcaa
-
SHA1
251e7438daf905004b5cecf6e2b04b36c08a05fb
-
SHA256
f6e50d4d6f51004ea71e6f62976d376e9fb6c6a053e84a69075901664e4ab98e
-
SHA512
0469d4ef377f689524a47bbd7e13b24c42a62067ebdb18b792c5f57fc652cb6a8f22b48d7de928b250a4ebb8a7465cee7593d74601980badcda6f52ef82acfe2
-
SSDEEP
1536:g91Uz0L02m9LFQHMc/qU5wSh7axk3JPPFdtLvPLXVtlSkToBwWkkWMAfs:g9Gz0FgZQHJyU5wSh7a+5XFdBMioBwWh
Malware Config
Signatures
Files
-
f6e50d4d6f51004ea71e6f62976d376e9fb6c6a053e84a69075901664e4ab98e.dll windows x86
65abd7392341657a83019a4aea37278a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
user32
MessageBoxExA
CharPrevA
wsprintfA
MessageBoxA
CharNextA
LoadStringA
advapi32
InitializeSid
RegCloseKey
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
GetSecurityDescriptorDacl
RegEnumValueA
RegQueryValueExA
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyExA
GetSidLengthRequired
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 470B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ