Static task
static1
Behavioral task
behavioral1
Sample
92f4383898f7e20d428b041bd08c09b14086efe38541f85e17449e2385e771b9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92f4383898f7e20d428b041bd08c09b14086efe38541f85e17449e2385e771b9.dll
Resource
win10v2004-20221111-en
General
-
Target
92f4383898f7e20d428b041bd08c09b14086efe38541f85e17449e2385e771b9
-
Size
64KB
-
MD5
b53a99973de0b89e047b01157a54fa16
-
SHA1
5b2a8ea93a1b58d8c888e15504936a49da8670d6
-
SHA256
92f4383898f7e20d428b041bd08c09b14086efe38541f85e17449e2385e771b9
-
SHA512
65ed92ed873d15a794d41da07cd8fe16c5ba3ce2e17f0106a17f5b60712ad469ae2a19c3432a28028d9f43769b58428a0ab4385e9b8b32aa32cb85745770ab41
-
SSDEEP
768:RdWL5Mjd6z2LLOYFacFTMi88fKEr3TYlz04Ox4J5qgrOWekQdzxct1hY:EuEz29F/Mivf1nF8J5qYckQdzx
Malware Config
Signatures
Files
-
92f4383898f7e20d428b041bd08c09b14086efe38541f85e17449e2385e771b9.dll windows x86
837165294499752a293fd707ddfac11e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
wcslen
_strcmpi
strcmp
kernel32
GetCurrentProcess
VirtualAlloc
CopyFileA
GetTempFileNameA
FindClose
CloseHandle
ReadFile
CreateFileA
GetFileSize
VirtualFree
MoveFileA
GetTempPathA
lstrcatA
CreateFileMappingW
DeleteFileA
lstrcpyA
SetFileTime
FindFirstFileA
MapViewOfFile
GetLastError
UnmapViewOfFile
lstrlenA
GetTickCount
GetProcAddress
GetModuleHandleA
GetVersionExA
MultiByteToWideChar
LoadLibraryA
DuplicateHandle
user32
CharUpperBuffW
SetDlgItemTextA
gdi32
Polygon
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ