Static task
static1
Behavioral task
behavioral1
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll
Resource
win10v2004-20220901-en
General
-
Target
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a
-
Size
224KB
-
MD5
5d433bc4a6d35d59163886ce2b018a50
-
SHA1
3a7adcc793a3e6eca7ab1a5a9a021011ce06ae29
-
SHA256
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a
-
SHA512
f216dc872de718b3c361bacbae9cd86bb87401b48fc57d11713988cf20318b070fbe67f41e361c9e9bcbf7ee4acc363f878debd73ecdf43709069a48c9a74bd3
-
SSDEEP
3072:7ImqxXr/3QUvVAcZcCLFVtRD69MttI5lpVGP:7IJxXjvVAiFt+wWVGP
Malware Config
Signatures
Files
-
8bbf95223e078c3cbbc7d6e766ed5b1bd8a195974c311b10c04b8954fe80844a.dll windows x86
f8f9881e7deb453fa9adde0a61a24228
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetWindowsDirectoryW
FindClose
FindFirstFileW
GetProcAddress
LoadLibraryW
CreateProcessW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
WaitForSingleObject
GetFileAttributesW
ReadFile
LocalFileTimeToFileTime
CreateDirectoryW
GetCurrentDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
CreateFileW
WriteFile
CloseHandle
lstrcpynW
GetTickCount
SystemTimeToFileTime
GetSystemTime
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
GetWindowTextW
IsWindowVisible
GetWindow
EnumWindows
SetForegroundWindow
MessageBoxW
GetDesktopWindow
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
ole32
CoInitialize
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitializeEx
shlwapi
SHDeleteKeyW
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ