vuyykz
Static task
static1
Behavioral task
behavioral1
Sample
fe2de52bed095d4e72167055b141698eb7eb530971018ae30a4c45a2551535cc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe2de52bed095d4e72167055b141698eb7eb530971018ae30a4c45a2551535cc.dll
Resource
win10v2004-20220901-en
General
-
Target
fe2de52bed095d4e72167055b141698eb7eb530971018ae30a4c45a2551535cc
-
Size
72KB
-
MD5
984ca5abf4deec2392ad0ac5467a8c27
-
SHA1
2fd33bf6fbb27e7b500644022c2c828d13d556aa
-
SHA256
fe2de52bed095d4e72167055b141698eb7eb530971018ae30a4c45a2551535cc
-
SHA512
026e6b0bd389a722e25da577eff665b8afb037e39233b199b7a9a6edb9b2ab69025e54da1ccbf801e708ec6c3d0212522befa6b5eeeaceddcacb9f66b23438a9
-
SSDEEP
768:Yw3Sa9CV2b/TVezblZAVO/Jyutr5b286kvIPy5RBISs675Y/StRGS9P9VEuB9APO:L3Xcihe5qhNP8RTs67jtRHPlB9jenc
Malware Config
Signatures
Files
-
fe2de52bed095d4e72167055b141698eb7eb530971018ae30a4c45a2551535cc.dll windows x86
30d67248742df645b9abce7b571bdd5d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
SetEvent
OpenEventW
SetCurrentDirectoryW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindFirstFileW
FindClose
GetLocalTime
CreateThread
DeviceIoControl
SetErrorMode
GetVolumeInformationW
GetDiskFreeSpaceW
GetCommandLineW
GetDriveTypeW
SetVolumeLabelW
GetEnvironmentVariableW
Sleep
CloseHandle
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetLastError
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
lstrcpyA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetVersion
GetCommandLineA
RtlUnwind
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetProcessHeap
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 526B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ