EnumTvValueNext
Static task
static1
Behavioral task
behavioral1
Sample
d152966a53a1a19eefdc81365fffc2c550fa83f2e07f51972f4b947ea50a31da.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d152966a53a1a19eefdc81365fffc2c550fa83f2e07f51972f4b947ea50a31da.dll
Resource
win10v2004-20220812-en
General
-
Target
d152966a53a1a19eefdc81365fffc2c550fa83f2e07f51972f4b947ea50a31da
-
Size
368KB
-
MD5
434314e97ae563a7aec54a951652e098
-
SHA1
ae39b3530eb54bdecfd37e7e121c5bae6985d81b
-
SHA256
d152966a53a1a19eefdc81365fffc2c550fa83f2e07f51972f4b947ea50a31da
-
SHA512
8d5e76df67c956f58a66ae0070a758dc7300eecf5c03d9ef6848e2b1d4782a416411cb94b8c01f58c21ffcff3cf173ec3cc85df01bdd6865c3e7ba7301d3f990
-
SSDEEP
6144:oOdQNeWORa+vhOql8YY5wXRyl/AvVjN67OX9S2OuT250pPPdQhWFX4jVxiTQZ0ex:oOddWH+Zx8F5wXRuKjwUgCT2CAhWJSVP
Malware Config
Signatures
Files
-
d152966a53a1a19eefdc81365fffc2c550fa83f2e07f51972f4b947ea50a31da.dll windows x86
5e7e827f2e700da5b964d8f462a86001
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
SetThreadPriority
CreateEventA
CreateMutexA
CloseHandle
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetModuleHandleA
GetVersionExA
Sleep
GetLocalTime
GetLastError
GetVersion
SetProcessWorkingSetSize
GetProcessWorkingSetSize
GetCurrentProcess
ResetEvent
VirtualAlloc
GetSystemInfo
AddAtomA
FindAtomA
DeleteAtom
WriteFile
SetFilePointer
ExitProcess
CreateThread
VirtualFree
SetLastError
SetErrorMode
QueryDosDeviceA
GetDriveTypeA
GetTimeZoneInformation
SetConsoleCtrlHandler
GetCurrentProcessId
SetEvent
FreeLibrary
ExitThread
WaitForSingleObject
ReleaseMutex
DeviceIoControl
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualLock
CreateFileA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
RtlUnwind
RaiseException
GetCommandLineA
HeapFree
FatalAppExitA
TerminateProcess
HeapReAlloc
HeapAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetCurrentThread
SetUnhandledExceptionFilter
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
FlushFileBuffers
IsBadWritePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
SetStdHandle
ReadFile
GetLocaleInfoW
user32
MessageBoxA
advapi32
MakeAbsoluteSD
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetFileSecurityA
Exports
Exports
Sections
.text Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ