install
Static task
static1
Behavioral task
behavioral1
Sample
d25d796ab79c7f9ab52de00340d57a66d08103354d60afa568119842c842335e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d25d796ab79c7f9ab52de00340d57a66d08103354d60afa568119842c842335e.dll
Resource
win10v2004-20220812-en
General
-
Target
d25d796ab79c7f9ab52de00340d57a66d08103354d60afa568119842c842335e
-
Size
84KB
-
MD5
0f275dcda6ce595d3772117daf98174c
-
SHA1
ac785c297dbae2ab34609cd8106714ae095de2f7
-
SHA256
d25d796ab79c7f9ab52de00340d57a66d08103354d60afa568119842c842335e
-
SHA512
cb9011402cc0dc9a73292840dff4a298a328e0f022c969fb6d97c6ecd2d0f107a7318d86a7ffd277015fb9ee05a19d2aec9bf6956df654ea6cc00d0f6127e548
-
SSDEEP
1536:cS/mrvhV6M53GZ5/vFz9g2E6QCKmWs6cxTEkr72yNgfSzP+vq4ld:KuM53w5XFRg2EJrcxTEkrDSvqM
Malware Config
Signatures
Files
-
d25d796ab79c7f9ab52de00340d57a66d08103354d60afa568119842c842335e.dll windows x86
17b4c9e21d3356380cb31f7f80e1c1ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
HeapAlloc
HeapCreate
InitializeCriticalSection
HeapDestroy
GetSystemInfo
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
SearchPathA
GetVersionExA
lstrcpynA
GetWindowsDirectoryA
GetTempPathA
EnterCriticalSection
OutputDebugStringA
DebugBreak
GetEnvironmentVariableA
GetLastError
CreateDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemTime
WinExec
lstrcmpA
FindClose
FindNextFileA
FindFirstFileA
HeapReAlloc
HeapFree
GetSystemDirectoryA
GetModuleFileNameA
MoveFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpiA
DeleteFileA
lstrlenA
GetFileSize
MoveFileExA
CopyFileA
CloseHandle
WriteFile
ReadFile
InterlockedIncrement
CreateFileA
InterlockedDecrement
lstrcatA
GetSystemDefaultLangID
lstrcpyA
SetCurrentDirectoryA
GetPrivateProfileSectionA
SetEnvironmentVariableA
user32
SetWindowTextA
ShowWindow
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindow
LoadImageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetDlgItem
GetParent
SetPropA
GetWindowLongA
EndDialog
SetDlgItemTextA
ExitWindowsEx
SetCapture
GetWindowRect
ClientToScreen
PtInRect
ReleaseCapture
LoadCursorA
SetCursor
GetPropA
CallWindowProcA
RemovePropA
CharLowerA
SetWindowLongA
FindWindowA
GetActiveWindow
wvsprintfA
CharNextA
GetCapture
SendMessageA
InvalidateRect
LoadStringA
DialogBoxParamA
PostMessageA
gdi32
GetObjectA
CreateFontIndirectA
DeleteObject
SetTextColor
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyA
RegQueryInfoKeyA
RegFlushKey
RegEnumValueA
FreeSid
shell32
ShellExecuteA
ole32
OleInitialize
OleUninitialize
shlwapi
SHDeleteValueA
StrToIntA
SHDeleteKeyA
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ