Static task
static1
Behavioral task
behavioral1
Sample
ec84b61da82b39b9fd40c773495d64cef734328bfa4b3d6fd453bb751f6fa4d7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec84b61da82b39b9fd40c773495d64cef734328bfa4b3d6fd453bb751f6fa4d7.dll
Resource
win10v2004-20220812-en
General
-
Target
ec84b61da82b39b9fd40c773495d64cef734328bfa4b3d6fd453bb751f6fa4d7
-
Size
64KB
-
MD5
2295eca0fb3fe8f0140a365c8095560e
-
SHA1
53fcd515acea009a24deb58ac61909afae7dc5e7
-
SHA256
ec84b61da82b39b9fd40c773495d64cef734328bfa4b3d6fd453bb751f6fa4d7
-
SHA512
d482d5178d8b426afae69a534697da0196605d9cd4ae1aa458095ed8513328acc24754e43efbc0392b6885ea4f9bc5d9134ee5230f1d0b90319e681f0f37d8db
-
SSDEEP
1536:nBdSL+YbUKin5HFnPscOTbt118DW/Jila2K9l+e1:bSCnLs4la2K9l+M
Malware Config
Signatures
Files
-
ec84b61da82b39b9fd40c773495d64cef734328bfa4b3d6fd453bb751f6fa4d7.dll windows x86
117bfcb9bfbd3a8421823a44d8200d4f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
kernel32
CopyFileA
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
OpenMutexA
SetEvent
CreateThread
CreateEventA
GetLastError
GetCurrentProcess
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
GetTickCount
RtlUnwind
ExitProcess
RaiseException
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapFree
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
SetUnhandledExceptionFilter
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
GetACP
GetOEMCP
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LoadLibraryA
InterlockedExchange
InitializeCriticalSection
HeapSize
user32
ExitWindowsEx
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ