Static task
static1
Behavioral task
behavioral1
Sample
f4f58a51504206c1085e182db0d7f6589ff256f46ebfbbbbf5e4a3ddd08d685f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4f58a51504206c1085e182db0d7f6589ff256f46ebfbbbbf5e4a3ddd08d685f.dll
Resource
win10v2004-20221111-en
General
-
Target
f4f58a51504206c1085e182db0d7f6589ff256f46ebfbbbbf5e4a3ddd08d685f
-
Size
124KB
-
MD5
df32b24b0717c15d9a2fcf2488b7e9b9
-
SHA1
07fbe0433d7578c8b90a117d2cf59d926e9bbafb
-
SHA256
f4f58a51504206c1085e182db0d7f6589ff256f46ebfbbbbf5e4a3ddd08d685f
-
SHA512
1a1adbae19375440f0ec0cb0e7b5235eba05b9e85d051a24c436007bee3d2aa0be114af0a5a4ac556569b880eb09706740cf216f75a1e5bc05656a35dc42db87
-
SSDEEP
3072:TXAOeUTg7o0HEVhkPK7HmdgFyMXAZrJ0mVY3HfwjldSv9nrPOD:0bUT10LPK/XyIHfwqRPOD
Malware Config
Signatures
Files
-
f4f58a51504206c1085e182db0d7f6589ff256f46ebfbbbbf5e4a3ddd08d685f.dll windows x86
d869ac033d5ed8a3448dc4e8d0c35df3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateNamedPipeW
CreateThread
CreateMutexW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
GetTempPathW
DisableThreadLibraryCalls
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
ConnectNamedPipe
SetEvent
CreateEventW
WaitForMultipleObjects
DisconnectNamedPipe
GetProcAddress
FreeLibrary
OpenProcess
GetVersionExW
ProcessIdToSessionId
GetCurrentProcess
DuplicateHandle
VirtualProtect
GetProcessHeap
GetCurrentThread
LocalFree
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
GetSystemDirectoryW
LoadLibraryExW
GetSystemWindowsDirectoryW
CreateDirectoryW
GetCommandLineA
SetUnhandledExceptionFilter
LCMapStringA
HeapSize
LoadLibraryA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetSystemInfo
user32
OpenWindowStationW
GetUserObjectInformationW
wsprintfA
CloseWindowStation
advapi32
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
RevertToSelf
OpenThreadToken
ImpersonateNamedPipeClient
GetSecurityInfo
CreateProcessAsUserW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetServiceStatus
RegisterServiceCtrlHandlerExW
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
DuplicateToken
AddAccessDeniedAce
AccessCheck
GetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFromStringBindingW
RpcBindingFree
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ