Static task
static1
Behavioral task
behavioral1
Sample
bf2f85b0fa41c19f13cedfb4513e47f4e1c3d5ba31a4d7132d881c9b22509098.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf2f85b0fa41c19f13cedfb4513e47f4e1c3d5ba31a4d7132d881c9b22509098.dll
Resource
win10v2004-20220812-en
General
-
Target
bf2f85b0fa41c19f13cedfb4513e47f4e1c3d5ba31a4d7132d881c9b22509098
-
Size
198KB
-
MD5
4a92b2ae59625bea75567bf84e315726
-
SHA1
9a701ed1e10ff24edbc268bd3ab20b7b0722a17b
-
SHA256
bf2f85b0fa41c19f13cedfb4513e47f4e1c3d5ba31a4d7132d881c9b22509098
-
SHA512
ab93b00429d0a9ddd771df40a00b95ba1bc3f97407e14fc36c0a9e49fd21596b37e83647008850cbf836cc4566b947eda39d8533566a75d76bf1720a0d24864b
-
SSDEEP
3072:Dl1+XuWoafiOFKM4/0ZZF8Cuz7qtjPkbPIc7tPfCV5yiFblcW:Dz5af5UN/0ZZJuKjPNi3YPcW
Malware Config
Signatures
Files
-
bf2f85b0fa41c19f13cedfb4513e47f4e1c3d5ba31a4d7132d881c9b22509098.dll windows x86
ecc38f25dc1d98b5c68a82dd1f2a5eb4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextA
InsertMenuA
LoadCursorA
GetSubMenu
GetMenuItemID
IntersectRect
SetFocus
DestroyCursor
GetScrollPos
DestroyMenu
PtInRect
GetKeyboardLayoutNameA
DrawIconEx
IsDialogMessageW
MsgWaitForMultipleObjects
GetMenuItemCount
GetForegroundWindow
TranslateMessage
PostMessageA
IsWindowVisible
IsZoomed
SetClassLongA
GetKeyboardLayoutList
SetWindowLongA
DrawFrameControl
OffsetRect
GetClassInfoA
KillTimer
RedrawWindow
SetCursor
MapVirtualKeyA
MessageBeep
SetScrollPos
IsWindowEnabled
DispatchMessageW
AdjustWindowRectEx
RegisterClipboardFormatA
SetMenuItemInfoA
EnumWindows
SetParent
EmptyClipboard
EnableWindow
CreatePopupMenu
SetScrollRange
GetCursorPos
MoveWindow
SendMessageA
GetDC
EnumThreadWindows
GetSysColorBrush
GetKeyNameTextA
IsChild
BeginPaint
DrawAnimatedRects
DestroyIcon
EnableMenuItem
GetLastActivePopup
SetWindowLongW
ShowOwnedPopups
CharToOemA
GetDCEx
GetSystemMenu
ActivateKeyboardLayout
GetDlgItem
GetMenuState
SetWindowTextA
GetScrollInfo
GetScrollRange
UnregisterClassA
FindWindowA
TranslateMDISysAccel
SetActiveWindow
ShowWindow
GetActiveWindow
GetSysColor
GetKeyboardLayout
FillRect
CallNextHookEx
LoadIconA
GetWindowLongW
CallWindowProcA
SetWindowPos
IsWindow
InvalidateRect
GetKeyboardState
GetClassLongA
GetWindowDC
CheckMenuItem
InflateRect
CreateWindowExA
RemoveMenu
DrawIcon
DrawTextA
GetDesktopWindow
UnhookWindowsHookEx
DefMDIChildProcA
GetParent
GetWindow
EnumChildWindows
ScreenToClient
CloseClipboard
RemovePropA
SetPropA
GetMenuStringA
CreateMenu
PeekMessageW
GetCursor
SetClipboardData
GetMenu
IsWindowUnicode
IsDialogMessageA
CreateIcon
GetTopWindow
MapWindowPoints
IsIconic
WaitMessage
SystemParametersInfoA
GetClipboardData
GetClientRect
DefWindowProcA
PostQuitMessage
GetWindowThreadProcessId
ChildWindowFromPoint
GetClassNameA
SetRect
UpdateWindow
GetMenuItemInfoA
ScrollWindow
LoadStringA
GetIconInfo
CharUpperBuffA
MessageBoxA
RegisterClassA
DeleteMenu
OemToCharA
SetTimer
TrackPopupMenu
RegisterWindowMessageA
ClientToScreen
GetCapture
GetSystemMetrics
wsprintfA
ReleaseCapture
GetKeyboardType
CharLowerBuffA
SetCapture
GetFocus
SetMenu
WindowFromPoint
GetWindowPlacement
GetWindowRect
SetForegroundWindow
GetMessagePos
IsRectEmpty
CharNextW
SetWindowsHookExA
LoadKeyboardLayoutA
EnableScrollBar
CharLowerA
SetScrollInfo
SendMessageW
EqualRect
InsertMenuItemA
ShowScrollBar
DispatchMessageA
CharNextA
LoadBitmapA
EndPaint
DestroyWindow
DefFrameProcA
PeekMessageA
msvcrt
memcpy
tan
rand
atan
kernel32
MulDiv
ExitProcess
GetOEMCP
GetCurrentThread
GetEnvironmentStrings
FindFirstFileA
GetDiskFreeSpaceA
DeleteCriticalSection
VirtualQuery
GetThreadLocale
SetEndOfFile
DeleteFileA
GlobalDeleteAtom
LocalFree
CreateEventA
ExitThread
GetSystemDefaultLangID
WideCharToMultiByte
HeapFree
FreeLibrary
SetHandleCount
GetUserDefaultLCID
FindResourceA
GetProcAddress
LoadLibraryA
CreateThread
GetTickCount
EnumCalendarInfoA
ReadFile
SetEvent
GetFileAttributesA
RaiseException
SizeofResource
GetModuleHandleA
LocalAlloc
GetStartupInfoA
InitializeCriticalSection
GetVersionExA
VirtualAllocEx
CompareStringA
WaitForSingleObject
GetProcessHeap
GetStringTypeA
SetErrorMode
LoadLibraryExA
GetFileType
GetCurrentProcess
LoadResource
FindClose
MoveFileExA
lstrcmpiA
GetFileSize
GetFullPathNameA
GetLocaleInfoA
HeapAlloc
Sleep
GetCurrentThreadId
GetCPInfo
lstrlenA
CreateFileA
GetLocalTime
GetLastError
VirtualAlloc
GetStringTypeW
ResetEvent
SetThreadLocale
lstrcpyA
CloseHandle
GlobalAlloc
lstrcmpA
FormatMessageA
WriteFile
EnterCriticalSection
GlobalAddAtomA
SetFilePointer
HeapDestroy
GetStdHandle
GetCurrentProcessId
MoveFileA
GetACP
VirtualFree
GetVersion
GetDateFormatA
LockResource
FreeResource
GetCommandLineA
SetLastError
GlobalFindAtomA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 62B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ