Behavioral task
behavioral1
Sample
d8d49d0c24354a00a75010d99119ed542fd56c289d92c9116c2c9b644a6831f6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8d49d0c24354a00a75010d99119ed542fd56c289d92c9116c2c9b644a6831f6.dll
Resource
win10v2004-20220901-en
General
-
Target
d8d49d0c24354a00a75010d99119ed542fd56c289d92c9116c2c9b644a6831f6
-
Size
169KB
-
MD5
097a1186577db9fa10306021e7fecb76
-
SHA1
156cefbf5f0eb7c5dd3e00198aaafab483a7df4e
-
SHA256
d8d49d0c24354a00a75010d99119ed542fd56c289d92c9116c2c9b644a6831f6
-
SHA512
33e0865dde6d239b9a7a9c5c3b4741a43d44153cec4af1418eb2327d3cc7501bd418f9a52bb5d267c9275b0eca0d3e5c7b803aec504bfd81deb4587f9ae5cc3f
-
SSDEEP
3072:UDcsoITi/e48HyR1iEDY6Adzwlhw6oSS/ypEccenv:OTi/YSlIzAWp/yew
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d8d49d0c24354a00a75010d99119ed542fd56c289d92c9116c2c9b644a6831f6.dll windows x86
c78b83a47d18f5e86c327c165dff6810
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
CreateProcessW
GetLastError
CloseHandle
CreateFileW
ReadFile
Sleep
CreateEventW
GetTickCount
WaitForSingleObject
CreateThread
GetProcAddress
FindFirstFileW
TerminateProcess
SetLastError
GetCurrentProcessId
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
GetWindowsDirectoryW
GetTempFileNameW
GetSystemTime
SetEndOfFile
CreateFileA
GetCurrentProcess
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
ExitProcess
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
CoCreateGuid
shlwapi
SHDeleteKeyW
wininet
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetAttemptConnect
InternetOpenW
InternetCheckConnectionW
InternetConnectW
HttpQueryInfoW
InternetReadFile
Sections
UPX0 Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE