dummy
Static task
static1
Behavioral task
behavioral1
Sample
54755c0c9357a5cbdf28dd5dc532fb228b15ad6da7281c8c7e6ed1b77ba32651.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54755c0c9357a5cbdf28dd5dc532fb228b15ad6da7281c8c7e6ed1b77ba32651.dll
Resource
win10v2004-20220812-en
General
-
Target
8716396966.zip
-
Size
217KB
-
MD5
4add61ae3f5028997f874abaede36166
-
SHA1
e0f7cb13ab9a8c6a26e7d69db1693ec36e6b9438
-
SHA256
de1994f830bd8e00260b1d0ce2238ec30bf73e4bc67cd07ed08054a25da840ce
-
SHA512
74871a9ea93ba4ebf38c27192990df64dfbff869aab87ebe9110f503910c8d256a8dbc6b7bbe969d1f80c30e6c5b151c1c51fbeb3ed1043e1ef95787367982c4
-
SSDEEP
3072:EaOfmcbN3bWWH/mWWII0zHmzyXj4XY532tcI37RZcl5CyZoFM2oHHO2aie0o5xL/:EawBrdfmWhI0zHmi/gchIM2oi3f/ya
Malware Config
Signatures
Files
-
8716396966.zip.zip
Password: infected
-
54755c0c9357a5cbdf28dd5dc532fb228b15ad6da7281c8c7e6ed1b77ba32651.dll windows x86
26f1e540d5fc98a8586e793443c41a5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
LoadLibraryW
GetProcAddress
CreatePipe
SetHandleInformation
WriteFile
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
EncodePointer
DecodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
GetLocaleInfoEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetLastError
RtlUnwind
RaiseException
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
CreateThread
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
HeapFree
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapAlloc
ReadFile
ReadConsoleW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
SetEndOfFile
GetTickCount
ExitProcess
CreateProcessW
GetModuleFileNameW
CloseHandle
TlsFree
GetCurrentProcess
GetTempFileNameW
GetTempPathW
ExpandEnvironmentStringsW
advapi32
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
user32
GetSystemMetrics
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoCreateGuid
StringFromGUID2
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
Exports
Exports
Sections
.text Size: 315KB - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ