Static task
static1
Behavioral task
behavioral1
Sample
9ad37b029992ae31715b99d4aa1e2906f75afbc64371a1542ca1a6876bfeae4c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ad37b029992ae31715b99d4aa1e2906f75afbc64371a1542ca1a6876bfeae4c.dll
Resource
win10v2004-20221111-en
General
-
Target
9ad37b029992ae31715b99d4aa1e2906f75afbc64371a1542ca1a6876bfeae4c
-
Size
164KB
-
MD5
e96a077c320a01f35abd0a3cc672f060
-
SHA1
b2164e0f457f4c95103c48ea10570c955e6016e6
-
SHA256
9ad37b029992ae31715b99d4aa1e2906f75afbc64371a1542ca1a6876bfeae4c
-
SHA512
6dbdac6e8e58471eda964c83a6ee897c64e60de61a3bc800b08a5394fb183c2e69321aa3c88898d4cf3dd6dad792277609dd0a24b80953f30bcb8329620589e9
-
SSDEEP
3072:aJK0qgFAcmxFgddTaqO8uXWSTOaUSn/8zBEtHrl:aTZacjdTY844G
Malware Config
Signatures
Files
-
9ad37b029992ae31715b99d4aa1e2906f75afbc64371a1542ca1a6876bfeae4c.dll windows x86
7f95913cad781a1a1c2955d1856185b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
WaitForSingleObject
Sleep
GetWindowsDirectoryW
FindFirstFileW
FindClose
CreateProcessW
GetLastError
GetProcAddress
TerminateProcess
SetLastError
GetTickCount
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
ReadFile
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
CreateDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
CloseHandle
WriteFile
CreateFileW
lstrcpynW
CreateThread
GetCurrentProcessId
GetSystemTime
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
LoadLibraryA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
user32
LoadIconW
MessageBoxW
GetDesktopWindow
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
Shell_NotifyIconW
ole32
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
CoCreateGuid
shlwapi
SHDeleteKeyW
wininet
HttpSendRequestW
InternetOpenW
InternetConnectW
InternetAttemptConnect
InternetCloseHandle
HttpOpenRequestW
InternetReadFile
HttpQueryInfoW
InternetCheckConnectionW
HttpAddRequestHeadersW
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ