Static task
static1
Behavioral task
behavioral1
Sample
e8a8a90e1e493f006bddc6e97022fec4360afb8e298d7260b211fc6977ee91a2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8a8a90e1e493f006bddc6e97022fec4360afb8e298d7260b211fc6977ee91a2.dll
Resource
win10v2004-20220812-en
General
-
Target
e8a8a90e1e493f006bddc6e97022fec4360afb8e298d7260b211fc6977ee91a2
-
Size
56KB
-
MD5
3c9428f4e5aec04fe120dd3f52bf1f6e
-
SHA1
3df4fd4f8c80f32c24f390729666656a48374f7b
-
SHA256
e8a8a90e1e493f006bddc6e97022fec4360afb8e298d7260b211fc6977ee91a2
-
SHA512
f65fba19ad90f5ca4e122e0523bd52bfb9858cb8f9d4ddec9e5daa52fd70e5354071775d285d812452bd905a5b39fe6f2646571752454ee1e9f5510db90c82c3
-
SSDEEP
768:OTEaIkoa7El/ZiLA7cbYzHRdpT01qVLWaIWOB41YQGRwJ9y59ocw3Qi:C2kQ6XEbRzT01qVLWGzYBwJ09ox3
Malware Config
Signatures
Files
-
e8a8a90e1e493f006bddc6e97022fec4360afb8e298d7260b211fc6977ee91a2.dll windows x86
50d1ad66ef5d89ce91dd236d7acc57f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
CompareStringA
WriteFile
lstrcpynA
GetModuleFileNameA
lstrlenA
GetLastError
GetWindowsDirectoryA
lstrcatA
Sleep
FindClose
MoveFileExA
MoveFileA
GetSystemDirectoryA
FindFirstFileA
TerminateProcess
OpenProcess
GetModuleHandleA
DeleteFileA
GetCurrentProcessId
CreateThread
GetCurrentProcess
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
CloseHandle
OutputDebugStringA
LoadLibraryA
lstrcpyA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
FlushFileBuffers
GetProcAddress
FindNextFileA
RtlUnwind
ExitProcess
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
user32
ExitWindowsEx
MessageBoxA
GetWindowThreadProcessId
SendMessageA
EnumWindows
advapi32
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ