Static task
static1
Behavioral task
behavioral1
Sample
a84cf9e54c6b20f73bba5e475372f824fe75328a7e7644c2672bc5109b1d5aad.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a84cf9e54c6b20f73bba5e475372f824fe75328a7e7644c2672bc5109b1d5aad.dll
Resource
win10v2004-20220901-en
General
-
Target
a84cf9e54c6b20f73bba5e475372f824fe75328a7e7644c2672bc5109b1d5aad
-
Size
213KB
-
MD5
93f9744ebb15c0559e2e594c0c95de31
-
SHA1
0b5199d0c82d802ea849eb63460a810f57f0c951
-
SHA256
a84cf9e54c6b20f73bba5e475372f824fe75328a7e7644c2672bc5109b1d5aad
-
SHA512
b8ca4acc925cc9fb9dc44f04d084eac6b5c252b6ec423158b500747a8a44d3bf721434418b528823469e11166ca6bba359ce74027517fb126b8f06a7d9e655be
-
SSDEEP
3072:bQlNTkfHeJqKqPwr5VsmVtqxhXSmaTnJhUJ4fFwOfb9XUYGhxcZj+r9TI1Z:8lp0Sy4r7TONcK6fb6vhx+qdI
Malware Config
Signatures
Files
-
a84cf9e54c6b20f73bba5e475372f824fe75328a7e7644c2672bc5109b1d5aad.dll windows x86
039d47e4d7de4edd6644be89ab6a7915
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDesktopFolder
SHGetFolderPathA
DragQueryFileA
user32
GetCursorPos
MessageBoxA
IsDialogMessageA
SetWindowTextA
GetClassInfoA
GetDCEx
SetWindowPos
GetScrollRange
CheckMenuItem
CreateMenu
GetScrollInfo
GetClassLongA
TrackPopupMenu
DispatchMessageA
GetWindow
GetSubMenu
EndPaint
GetMenuItemID
CharNextA
GetPropA
GetMenuItemInfoA
EnableMenuItem
GetScrollPos
GetActiveWindow
EnableWindow
CharToOemA
FindWindowA
CreatePopupMenu
DefMDIChildProcA
DeferWindowPos
EnumWindows
BeginDeferWindowPos
DrawIconEx
GetDC
ShowScrollBar
DrawMenuBar
GetCapture
GetSysColorBrush
GetClipboardData
SystemParametersInfoA
GetMenuStringA
DefFrameProcA
EndDeferWindowPos
IsChild
CreateWindowExA
DispatchMessageW
IsWindowEnabled
CharLowerA
RegisterClassA
CallWindowProcA
GetDlgItem
GetClientRect
DrawEdge
SetWindowLongA
FillRect
GetMenuItemCount
ShowWindow
EnableScrollBar
GetParent
DefWindowProcA
CreateIcon
FrameRect
kernel32
GetFileType
GetFileAttributesA
GetThreadLocale
SetHandleCount
MoveFileExA
GetStartupInfoA
LoadResource
SetErrorMode
GetCurrentProcessId
FindResourceA
VirtualAllocEx
lstrcmpA
VirtualAlloc
FreeLibrary
lstrlenA
lstrcmpiA
CreateEventA
FreeResource
GetCPInfo
GetModuleHandleA
ExitThread
ResetEvent
GetCommandLineA
WaitForSingleObject
GetCurrentProcess
CompareStringA
GlobalAlloc
GetStdHandle
VirtualQuery
GetSystemDefaultLangID
GetDiskFreeSpaceA
LoadLibraryExA
FindClose
DeleteCriticalSection
MulDiv
GetProcessHeap
ReadFile
LocalAlloc
GetLastError
EnterCriticalSection
HeapFree
GetProcAddress
GetDateFormatA
SizeofResource
GetFileSize
lstrcpyA
DeleteFileA
GetVersionExA
GlobalAddAtomA
SetThreadLocale
GetLocaleInfoA
CloseHandle
GetStringTypeW
CreateFileA
FormatMessageA
LocalFree
Sleep
SetEvent
RaiseException
SetFilePointer
SetEndOfFile
HeapDestroy
GetFullPathNameA
GetVersion
MoveFileA
LoadLibraryA
msvcrt
srand
log10
memcpy
pow
Sections
CODE Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ