Static task
static1
Behavioral task
behavioral1
Sample
_setup.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
_setup.dll
Resource
win10v2004-20220812-en
General
-
Target
_setup.dll
-
Size
34KB
-
MD5
e56e177842fa2c3392fed9e5cff32ca8
-
SHA1
1560587515703b884c8c737792e5cfbb72fe56d3
-
SHA256
14e0d8ca093911b15e2abdde7687fe49a3395ae5107df4f0bcc62f59bd2c0649
-
SHA512
e46be5927708121107ba839646ce189a0f12f58b6accf1b281c23d17f5d5bce540fdd79f7c1054431312631fdaddeb5f64088aa46671e10687d4877ca7d3eb6a
-
SSDEEP
384:p5pEMp4r7b9Tw6AGrGhOMod0nJ4V+vtvhkKCysQBrFge15m0V4uxrt/hV:KMARw6AlFoeJNBPCUFg+7
Malware Config
Signatures
Files
-
_setup.dll.dll windows x86
211a1ac2159862c6038f1d798175f2be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStrings
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetEnvironmentStringsW
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
GetProcAddress
LoadLibraryA
FlushFileBuffers
CloseHandle
SetStdHandle
SetFilePointer
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ