Static task
static1
Behavioral task
behavioral1
Sample
938c833bec1582e0a26e5266b6b34f96.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
938c833bec1582e0a26e5266b6b34f96.dll
Resource
win10v2004-20220812-en
General
-
Target
938c833bec1582e0a26e5266b6b34f96
-
Size
156KB
-
MD5
938c833bec1582e0a26e5266b6b34f96
-
SHA1
0d1f053fb127b380d68eeca276ed95af4fc17262
-
SHA256
2ee99a16d48e78d04877da7f749da12d6ba252f12c246c709f48c6a187cedc74
-
SHA512
933be6cde4a4a65c9c9ad4bdc7d74cd3cd06d2a8981965d5344868cd62925698d2962cf5b41a50be9bd9a9a7feaf4849586dc747dbd02945c604f6b23f11afa7
-
SSDEEP
3072:RAGbkFt2tUaG195VUxFUjlifno6bzjjuhPVSGPgbRjCoTlEbVXiBRpiD6W/568dn:RAykf6G195VUzUjlivlj6JVIRjVTlEbo
Malware Config
Signatures
Files
-
938c833bec1582e0a26e5266b6b34f96.dll windows x86
a3e233da8ba91aecf986065115f72bd0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
wcslen
wcscpy
wcscat
memcpy
kernel32
HeapCreate
HeapDestroy
GetModuleHandleW
CloseHandle
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessW
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
WriteFile
CreateFileW
SetFilePointer
WideCharToMultiByte
HeapReAlloc
shell32
ShellExecuteExW
Sections
.code Size: 512B - Virtual size: 509B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ