Static task
static1
Behavioral task
behavioral1
Sample
ff92bbffbac8f87e9263af292a7187468edb3a4646c08536ac764383904218f3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff92bbffbac8f87e9263af292a7187468edb3a4646c08536ac764383904218f3.dll
Resource
win10v2004-20220812-en
General
-
Target
ff92bbffbac8f87e9263af292a7187468edb3a4646c08536ac764383904218f3
-
Size
91KB
-
MD5
ed6a312c88629dcd2025f4ba238b2f82
-
SHA1
5a4d6a1d0cf0ea89f3b5783268f390ee06ebf1fc
-
SHA256
ff92bbffbac8f87e9263af292a7187468edb3a4646c08536ac764383904218f3
-
SHA512
f5dcc83e77088d33e5abb072ed4dbfcfa9752abad069e183fc2342dbb44c881e61aa08566f9b67fe64093e0a1eeb5e48ff6ba3201ee1ff8df9c645251a87214a
-
SSDEEP
1536:XZm2bEZffTdSyOtXtld+3lIToggqe4bSlBISAEFcP/DzmSpptR:JmAEZsNt9GlIUn9BIWU/DyS3tR
Malware Config
Signatures
Files
-
ff92bbffbac8f87e9263af292a7187468edb3a4646c08536ac764383904218f3.dll windows x86
cd0a21f576806aa2e7ff8dc024d621ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharW
LoadAcceleratorsA
CreatePopupMenu
CharUpperBuffA
CharToOemA
ActivateKeyboardLayout
kernel32
MapViewOfFile
lstrcmpA
lstrcatA
VirtualAlloc
UnmapViewOfFile
TlsGetValue
TlsFree
EnterCriticalSection
EnumResourceLanguagesW
EnumResourceNamesA
ExitProcess
ExitThread
FindResourceA
FreeResource
GetLastError
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTimeAsFileTime
LeaveCriticalSection
LocalAlloc
TlsAlloc
OpenFileMappingA
ReadFile
RtlUnwind
Sleep
oleaut32
OleIconToCursor
SetErrorInfo
SysFreeString
SysReAllocString
VarBstrCat
ClearCustData
Sections
.text Size: 21KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 66KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ