Static task
static1
Behavioral task
behavioral1
Sample
c4911abaa86f9f63ec23a9444b97105a5c21ffadb8278274f1b0c7b430e39cae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4911abaa86f9f63ec23a9444b97105a5c21ffadb8278274f1b0c7b430e39cae.dll
Resource
win10v2004-20220812-en
General
-
Target
c4911abaa86f9f63ec23a9444b97105a5c21ffadb8278274f1b0c7b430e39cae
-
Size
144KB
-
MD5
8ccbe40c3115c39b6064af4653783fa9
-
SHA1
c77f8249fb590fbe1344811c0291103048bc8a6e
-
SHA256
c4911abaa86f9f63ec23a9444b97105a5c21ffadb8278274f1b0c7b430e39cae
-
SHA512
5b6c092be42cbdf3baca191d01d4d6a32ad63f842a4b217675250ada3e724d64df7a24456a0df95f37ba99cec4dd751cc5a83af415ce100f462b11ab1ee98529
-
SSDEEP
1536:OZ437LfVABem+nb3+fuQgIb0/Y27zBFFO2A/ymRXat3Qy2Si2kDe9MtSV8U:HABeHbi3B0Q271F9m62Stke9MtSVZ
Malware Config
Signatures
Files
-
c4911abaa86f9f63ec23a9444b97105a5c21ffadb8278274f1b0c7b430e39cae.dll windows x86
a24f3cbf6d4bad19efa3089fd20c78dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
Sleep
GetTickCount
CreateEventW
WaitForSingleObject
SetEvent
CreateThread
GetProcAddress
TerminateProcess
SetLastError
GetCurrentProcessId
GetLastError
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
CreateProcessW
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetTempFileNameW
WideCharToMultiByte
GetSystemTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
ExitProcess
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoInitializeEx
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoInitialize
CoUninitialize
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetAttemptConnect
shlwapi
SHDeleteKeyW
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ