Static task
static1
Behavioral task
behavioral1
Sample
_setup.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
_setup.dll
Resource
win10v2004-20221111-en
General
-
Target
_setup.dll
-
Size
35KB
-
MD5
dc398d76aefc991ebe4821e400ad9323
-
SHA1
7ca5b5d3a95d3faa2ac8a2ae0f104093b566863e
-
SHA256
0f91ba57b0db9eb41c083762fa5bbbac71958a42cfd91b3cc8c6ec46dab53aaf
-
SHA512
7608401394e55a6056a40ba601d90ccca1def61496a631a374e4f00747d2d4e14c2f8797c9a831f80422da26a9894fef6e105904d729badcb795e6d10e14b3cf
-
SSDEEP
384:WdsKUvnz9TjLWxyf4BkAG+ZyIji6CvysQBrFge5lmnmBX5739J7DsAt/hV:7L5GFB5ZyIjfuUFgYBXl3fDv
Malware Config
Signatures
Files
-
_setup.dll.dll windows x86
211a1ac2159862c6038f1d798175f2be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStrings
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetEnvironmentStringsW
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
GetProcAddress
LoadLibraryA
FlushFileBuffers
CloseHandle
SetStdHandle
SetFilePointer
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ