Static task
static1
Behavioral task
behavioral1
Sample
dac7a93b16e0dfdfd03f858fb7efee6c7b5026cc011fc7743670ccb333a21aff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dac7a93b16e0dfdfd03f858fb7efee6c7b5026cc011fc7743670ccb333a21aff.dll
Resource
win10v2004-20220812-en
General
-
Target
dac7a93b16e0dfdfd03f858fb7efee6c7b5026cc011fc7743670ccb333a21aff
-
Size
51KB
-
MD5
fb32055c1e0cbd380d965bca8db14160
-
SHA1
fdff7bf24b8c5315311f98d5ebd31f74c3212c58
-
SHA256
dac7a93b16e0dfdfd03f858fb7efee6c7b5026cc011fc7743670ccb333a21aff
-
SHA512
17d0f5d5a442db3bba0f77ac7b4d41892525c05c434b1465ab26d84bd454b4f60eaeb775d2b8c735acc768d4b97666811dc8edefbfd8dd00f65a6a756559320b
-
SSDEEP
1536:8jAV/SNW0nuwNH1XJlIfgUEcKGUKjTQiyao:J/ONHZsfgZYTQiDo
Malware Config
Signatures
Files
-
dac7a93b16e0dfdfd03f858fb7efee6c7b5026cc011fc7743670ccb333a21aff.dll windows x86
8a0b1d7618f0d54659a6940156ea5da0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GlobalAlloc
VirtualProtect
GlobalFree
EnterCriticalSection
InitializeCriticalSection
InterlockedIncrement
WaitForSingleObject
InterlockedCompareExchange
InterlockedDecrement
HeapAlloc
GetProcessHeap
HeapFree
CreateEventA
CreateSemaphoreA
CloseHandle
LeaveCriticalSection
TlsFree
InterlockedExchangeAdd
DeleteCriticalSection
TlsSetValue
TlsGetValue
InterlockedExchange
ReleaseSemaphore
msvcr71
_except_handler3
_adjust_fdiv
free
malloc
_initterm
__CppXcptFilter
__dllonexit
_onexit
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 682B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ