Static task
static1
Behavioral task
behavioral1
Sample
11d8a49c65a98e9524c53c12ce07106c0e177d822aa39390d969d2b2c1e374b8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11d8a49c65a98e9524c53c12ce07106c0e177d822aa39390d969d2b2c1e374b8.dll
Resource
win10v2004-20220812-en
General
-
Target
11d8a49c65a98e9524c53c12ce07106c0e177d822aa39390d969d2b2c1e374b8
-
Size
168KB
-
MD5
f15b3edd930a9b34173d402251c7e2ba
-
SHA1
188584148afa8e6d1337af5bf4447297f156459c
-
SHA256
11d8a49c65a98e9524c53c12ce07106c0e177d822aa39390d969d2b2c1e374b8
-
SHA512
5d21b7dff28f2e56afdf5d14e7b792fcbb57c6b5083567ec0b460b2fe1985beb0bd9ad893111fb39773869ad4b33244be1a991262c68dafdf4984f0c90260011
-
SSDEEP
3072:YfuPlLY1Rd0PL4Fxm1O3Ib+H8XHOdy1lQXVTlNxCqW4oAct/z:Yf0Lps7yO3WU83Zb4VlNxMb
Malware Config
Signatures
Files
-
11d8a49c65a98e9524c53c12ce07106c0e177d822aa39390d969d2b2c1e374b8.dll windows x86
8d39cc29fc03ef63eb422a7846da88c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapSize
HeapReAlloc
GetACP
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalFree
GlobalFree
CloseHandle
GetModuleFileNameA
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalReAlloc
GlobalAlloc
lstrcpyA
lstrlenA
lstrcmpA
lstrcpynA
GetLastError
SetLastError
GlobalLock
GetFileType
GlobalUnlock
user32
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetClassInfoA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
SetWindowTextA
ClientToScreen
wsprintfA
EnableWindow
GetDesktopWindow
PostQuitMessage
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
LoadStringA
UnregisterClassA
UnhookWindowsHookEx
GetWindowTextA
WinHelpA
GetCapture
GetMenuCheckMarkDimensions
LoadBitmapA
PostMessageA
SendMessageA
SetCursor
MessageBoxA
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetTopWindow
DestroyMenu
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
gdi32
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
odbc32
ord5
ord16
ord61
ord13
ord18
ord12
ord72
ord19
ord3
ord54
ord10
ord11
ord14
ord9
ord15
ord51
ord45
ord50
ord23
ord1
ord2
ord41
ord43
ord68
ord46
ord44
ord8
ord59
ord17
ord20
ord49
ord48
ord4
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE