HookInit
Static task
static1
Behavioral task
behavioral1
Sample
9a33e43b74e28d56f952b19236b372f51bc3fad3a41079952c55f9cbcb4530c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a33e43b74e28d56f952b19236b372f51bc3fad3a41079952c55f9cbcb4530c6.dll
Resource
win10v2004-20220901-en
General
-
Target
9a33e43b74e28d56f952b19236b372f51bc3fad3a41079952c55f9cbcb4530c6
-
Size
478KB
-
MD5
279bde368cf590047e1c9c1ef3d5ebd4
-
SHA1
4e644564aa0b27dcc4ca0d3e19f8cc5122c6ece7
-
SHA256
9a33e43b74e28d56f952b19236b372f51bc3fad3a41079952c55f9cbcb4530c6
-
SHA512
39ace3cd215770f137817c1fd30354b3b2ef6355ecb71d3484acf81369a3d3f47fcd497ccd6f988067159d27b5a3ffb69855912caf9cdfb04ab94831875d24af
-
SSDEEP
12288:+gnJVznsYv7D+8RgeTE6sJ+LWmuxsizCRYi7yP:7nJVzjDDJqeAJ+SaquJyP
Malware Config
Signatures
Files
-
9a33e43b74e28d56f952b19236b372f51bc3fad3a41079952c55f9cbcb4530c6.dll windows x86
f74d6d42b218dd594e816e8726603ae4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
GetProcAddress
LoadLibraryA
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
ReadProcessMemory
VirtualProtect
IsBadCodePtr
GetCurrentProcess
user32
MessageBoxA
Exports
Exports
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 485B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 266B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ