Static task
static1
Behavioral task
behavioral1
Sample
b10eb24a74962ee4627b862538fa6b27e7e20d629ffb51b4d746df96c3dde708.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b10eb24a74962ee4627b862538fa6b27e7e20d629ffb51b4d746df96c3dde708.dll
Resource
win10v2004-20221111-en
General
-
Target
b10eb24a74962ee4627b862538fa6b27e7e20d629ffb51b4d746df96c3dde708
-
Size
46KB
-
MD5
55835bff168b9c689f4d0748e987816f
-
SHA1
db2626ed38b452dfa09370ec052e32fa6f3b9437
-
SHA256
b10eb24a74962ee4627b862538fa6b27e7e20d629ffb51b4d746df96c3dde708
-
SHA512
002a01ecb8a50498661dcc591af852c5b451ffef38dc8c2474bb35f06c5a310ab3da95c1141e3c042a664e31c1a80e3e2daff4d2ea6afd83b527ff894f4bd94f
-
SSDEEP
768:pNbsvd9HPZKhXQgkgbW8haf+dbwtebNQffhxet3BiedRWF1vrkBF3rf2:pNgvdehRbWiaMbgebNQHetsxoBFD2
Malware Config
Signatures
Files
-
b10eb24a74962ee4627b862538fa6b27e7e20d629ffb51b4d746df96c3dde708.dll windows x86
dbb268a858c1392d055274ded7894cf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
HeapValidate
IsValidLanguageGroup
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ