Static task
static1
Behavioral task
behavioral1
Sample
extracted_at_0x0.dll
Resource
win10-20220812-en
General
-
Target
extracted_at_0x0.exe
-
Size
172KB
-
MD5
b019f180d826b16c5e09cadb134d24f4
-
SHA1
7e65258ff31ea83c3297064157541a6c7baaec34
-
SHA256
be0d3cb6a988fb536c728d62abacd61b9977c9211f09ef6506d1351919445dd3
-
SHA512
9bbf20afd3c8478b3ebcac7c6a2f16489f360cdb30bfc3b6d41f34a2379e63898daee9c8042901a4b6e92386fc2a24d0c13a74a66cbbcd380bc43a5fe242ccd2
-
SSDEEP
3072:j82l42IQ+0Gh/CX8bYS3oAlobjUgS0cRilFxfiHNSXcJiB5CT01bDmDxWaB47uel:j82lShBC41SFL1LjO5o
Malware Config
Signatures
Files
-
extracted_at_0x0.exe.dll windows x64
1cf1007474fd32ebc96cdcb6646354bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtect
GetCurrentProcess
WriteFile
GetModuleFileNameW
CreateMutexA
UnmapViewOfFile
GetModuleHandleA
Sleep
GetLastError
CreateFileA
GetSystemDirectoryA
LoadLibraryA
CloseHandle
K32GetModuleInformation
GetProcAddress
GetFileSize
FreeLibrary
CreateFileMappingW
MapViewOfFile
WriteConsoleW
CreateFileW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
TerminateProcess
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
GetStringTypeW
SetFilePointerEx
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
user32
CharToOemW
Sections
.text Size: 113KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 106B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ