Static task
static1
Behavioral task
behavioral1
Sample
d3af7fc1009577eabf80a11b7dfc95a75fcf4f8514b9780e91a22ee707fce76f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3af7fc1009577eabf80a11b7dfc95a75fcf4f8514b9780e91a22ee707fce76f.dll
Resource
win10v2004-20220812-en
General
-
Target
d3af7fc1009577eabf80a11b7dfc95a75fcf4f8514b9780e91a22ee707fce76f
-
Size
256KB
-
MD5
2defdc5903cfb1f864b20a88c9154404
-
SHA1
4bcb20e0039ad30ea648346a7d713e1b877012a7
-
SHA256
d3af7fc1009577eabf80a11b7dfc95a75fcf4f8514b9780e91a22ee707fce76f
-
SHA512
11557c5c97444bba5151625d58e1a22d9f339cde4b0f859ae54d34a127d50bc134e7f704900fbe96f45eb80e33caa6324f98b0a7abe098466f75c94f5feca1b5
-
SSDEEP
3072:34gCph/xJzmUtQVTxkzY8dFJ7DXMzdy4lqwCmv3o3CYUunmFDWZW8Fy2ZHRuX6tn:zMxJeVTxPe2WCDtguX8T
Malware Config
Signatures
Files
-
d3af7fc1009577eabf80a11b7dfc95a75fcf4f8514b9780e91a22ee707fce76f.dll windows x86
951a15822b16463d6f02f84d2915d8a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
Netbios
kernel32
OpenEventW
SetEvent
Sleep
CreateProcessW
GetLastError
CloseHandle
GetTickCount
CreateEventW
WaitForSingleObject
CreateThread
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetTempFileNameW
GetSystemTime
CreateFileA
GetVersionExA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
RaiseException
RtlUnwind
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
wininet
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetAttemptConnect
InternetCheckConnectionW
InternetOpenW
InternetConnectW
shlwapi
SHDeleteKeyW
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ