RunProc
Static task
static1
Behavioral task
behavioral1
Sample
071808d3ef79b01ad8bab9ff9d031e66ddd89d61b973dd680c7e9a8362c1546e.dll
Resource
win7-20220901-en
General
-
Target
22c884dd78b0ab7f6c6c5eedd37a4e89.bin
-
Size
826KB
-
MD5
838f06eb92b2bcd1ff9475eba5de01cf
-
SHA1
7105516dba98d937e94724b98c2c4d3ed3936849
-
SHA256
4c70622cd8bc212dfbe31763713d6e93a490198f1b47ee2123a39051ade8e746
-
SHA512
d359adef81239bacd9fb0055a085220322702a244348c3babd1d3eb2dbc2076dca6dd4e90b978201fd5ae2d6da8c3a2e629ed38eb6b86c1df3d802a77398a994
-
SSDEEP
24576:lRpUjDKUmP9X/MplyI4S3XRn5Tw+pmffQvG:4WllUplyI4SHR5T/pQ4O
Malware Config
Signatures
Files
-
22c884dd78b0ab7f6c6c5eedd37a4e89.bin.zip
Password: infected
-
071808d3ef79b01ad8bab9ff9d031e66ddd89d61b973dd680c7e9a8362c1546e.exe.dll windows x64
Password: infected
30e4951baaf3486172393b81f9118d19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetProcessHeap
CreateFileA
CloseHandle
GetCurrentActCtx
TryEnterCriticalSection
GetModuleFileNameA
GetModuleHandleA
SetCurrentDirectoryA
GetFileSize
GetFileInformationByHandle
WaitForMultipleObjects
SetFileTime
OpenFileMappingA
CreateNamedPipeA
ConnectNamedPipe
VirtualAlloc
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetLastError
SetLastError
GetCurrentThreadId
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryExW
CompareStringW
LCMapStringW
DeleteCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
ExitProcess
GetModuleHandleExW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapReAlloc
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
FindClose
FindFirstFileExA
FindNextFileA
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStdHandle
GetFileType
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 330KB - Virtual size: 329KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 637KB - Virtual size: 643KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ