Static task
static1
Behavioral task
behavioral1
Sample
a4c2be53e411a069a6cf856fb04115f4ffe0fc50f69d7381f2bdbd38bb54260e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4c2be53e411a069a6cf856fb04115f4ffe0fc50f69d7381f2bdbd38bb54260e.dll
Resource
win10v2004-20220812-en
General
-
Target
a4c2be53e411a069a6cf856fb04115f4ffe0fc50f69d7381f2bdbd38bb54260e
-
Size
267KB
-
MD5
d3de56f6b5fa12494b7ed3dcc94109ce
-
SHA1
d58a38bcae1cee873f3860960e27a74a3ccefc8c
-
SHA256
a4c2be53e411a069a6cf856fb04115f4ffe0fc50f69d7381f2bdbd38bb54260e
-
SHA512
e19f4e9edff0dd970ac4e9693b36764fcb292c41403b56bdccc27ef3ae7ed6d1bb654d192e5d1d8f54d62fa72cd409c9bf447d4fc56edd532a32cf90c34adbbe
-
SSDEEP
6144:ApKScgNdr/tEiPlmtBp8VbQEmr4HsdTJaGemF1S1EwhMqu8JPSq7HV:ApKz0/KiP8j84r4MdTEsA1Ewha8JVp
Malware Config
Signatures
Files
-
a4c2be53e411a069a6cf856fb04115f4ffe0fc50f69d7381f2bdbd38bb54260e.dll windows x86
59701b42a1b37414f3476cfbc71379eb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetFullPathNameA
GetFullPathNameW
EnumDateFormatsExA
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedExchange
GetDiskFreeSpaceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateSemaphoreA
ReleaseSemaphore
ExitThread
WritePrivateProfileStringA
GetPrivateProfileStringA
FileTimeToLocalFileTime
lstrcmpA
lstrcmpW
GlobalFree
GlobalUnlock
GlobalAlloc
GetACP
GetTempFileNameA
oleaut32
SafeArrayDestroyDescriptor
SafeArrayCreateEx
OleTranslateColor
SafeArrayGetRecordInfo
SafeArraySetIID
SetErrorInfo
SysAllocString
SysAllocStringLen
msvfw32
ICInfo
Sections
.text Size: 170KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ