EnumDeviceNext
Static task
static1
Behavioral task
behavioral1
Sample
36e0b663551fd02f015ff5b397c6794c74d7e6311c7a8b5e1290a2308615ce76.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
36e0b663551fd02f015ff5b397c6794c74d7e6311c7a8b5e1290a2308615ce76.dll
Resource
win10v2004-20221111-en
General
-
Target
36e0b663551fd02f015ff5b397c6794c74d7e6311c7a8b5e1290a2308615ce76
-
Size
81KB
-
MD5
dcfbcc6e032996552c785944407c9960
-
SHA1
e08fc6ac734c7e0b7d289871b8cb8427875899aa
-
SHA256
36e0b663551fd02f015ff5b397c6794c74d7e6311c7a8b5e1290a2308615ce76
-
SHA512
cf862f877194e5d777f23c60b122a234424f43141224d4a77e80a5cf0c4d3c3b1054ea34a71d02475eb470cb25b28b10957aa39de0f583cba22ae79281023e26
-
SSDEEP
1536:LhqV52y1A5BlpTr6JNTMkQW055vZTaLxQkIAXCaPVgPc5RkkHyZmIbyu:lw5TU3pTrqTMkM4LxAiFP20AcgZ
Malware Config
Signatures
Files
-
36e0b663551fd02f015ff5b397c6794c74d7e6311c7a8b5e1290a2308615ce76.dll windows x86
6a7ebe4d30e4a3493d8a64fe686698c9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
ChangeTimerQueueTimer
CloseHandle
CreateFileW
CreateMailslotW
DisableThreadLibraryCalls
EnumLanguageGroupLocalesA
ExitProcess
ExitThread
FindAtomW
GetCommandLineA
GetCurrentThreadId
GetFileSizeEx
GetLogicalDriveStringsA
GetModuleHandleA
GetPrivateProfileSectionNamesW
GetPrivateProfileStructA
GetStartupInfoA
GetStringTypeA
GetSystemDefaultLangID
GetTapePosition
GetTimeZoneInformation
GetVersionExA
GlobalGetAtomNameA
GlobalReAlloc
GlobalSize
HeapAlloc
HeapCreate
HeapDestroy
IsBadWritePtr
LoadLibraryA
LocalSize
MoveFileExW
MoveFileWithProgressA
OpenEventW
SetCalendarInfoW
SetFilePointerEx
SetProcessPriorityBoost
VerifyVersionInfoA
lstrcpynA
user32
CallWindowProcA
DeleteMenu
DialogBoxParamA
DrawMenuBar
EmptyClipboard
EndDialog
FindWindowA
GetMenuItemCount
GetSysColorBrush
GetWindow
GetWindowTextA
InvalidateRgn
IsDialogMessageA
IsZoomed
LoadCursorA
OffsetRect
OpenClipboard
PostMessageA
ScreenToClient
SetWindowPlacement
SetWindowTextA
UnionRect
WindowFromPoint
advapi32
StartTraceA
SetUserFileEncryptionKey
SetSecurityDescriptorOwner
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExA
RegLoadKeyW
RegEnumKeyA
RegDeleteKeyW
ObjectPrivilegeAuditAlarmW
LsaSetTrustedDomainInformation
LsaSetDomainInformationPolicy
LsaRemovePrivilegesFromAccount
LsaCreateTrustedDomainEx
LsaClose
GetTrusteeNameA
GetSidLengthRequired
GetSecurityInfoExW
GetNamedSecurityInfoA
FreeSid
EnumServicesStatusExA
ElfClearEventLogFileA
CryptGetKeyParam
AddAuditAccessAceEx
AdjustTokenGroups
CheckTokenMembership
CloseEncryptedFileRaw
CloseTrace
ConvertSidToStringSidA
ConvertStringSDToSDRootDomainW
olepro32
OleCreatePropertyFrame
oleacc
GetRoleTextA
AccessibleObjectFromEvent
AccessibleChildren
security
ImportSecurityContextA
AddSecurityPackageW
QuerySecurityContextToken
QuerySecurityPackageInfoA
comctl32
ImageList_GetDragImage
FlatSB_SetScrollProp
CreatePropertySheetPageA
ImageList_Add
ImageList_Copy
ImageList_Destroy
ImageList_DragShowNolock
FlatSB_SetScrollRange
ImageList_GetImageRect
ImageList_SetIconSize
LBItemFromPt
MenuHelp
PropertySheetW
oledlg
OleUIConvertA
OleUIEditLinksA
OleUIChangeSourceA
OleUIBusyA
comdlg32
dwLBSubclass
ReplaceTextW
PrintDlgW
PrintDlgExW
GetSaveFileNameA
PrintDlgA
ReplaceTextA
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ