CgvSEcXgGkbWwkFa
Static task
static1
Behavioral task
behavioral1
Sample
ebd17e1d8d51efbcedb8ffbb99a1d917a21a901973b25024dc9b0c51168663fa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebd17e1d8d51efbcedb8ffbb99a1d917a21a901973b25024dc9b0c51168663fa.dll
Resource
win10v2004-20220812-en
General
-
Target
ebd17e1d8d51efbcedb8ffbb99a1d917a21a901973b25024dc9b0c51168663fa
-
Size
114KB
-
MD5
80350d30a8b63620561d0d931770526b
-
SHA1
be6bd1fdda72100f6581051ccca3d80711f75d10
-
SHA256
ebd17e1d8d51efbcedb8ffbb99a1d917a21a901973b25024dc9b0c51168663fa
-
SHA512
56e11a2e768138419550c9e4fe6ddc57ac9b1a0701f4e97d5a2ecdc175a4add6362a00ad59d8132256b4fe0c920678443c18ff5a8145d19cb1ab2e5c27c0fcd9
-
SSDEEP
3072:I0F5r2jQ6YDGtUCb2NZsHUUI2oy79jngsvExKUY:I0rbDGtf2NO0r2B9cLM
Malware Config
Signatures
Files
-
ebd17e1d8d51efbcedb8ffbb99a1d917a21a901973b25024dc9b0c51168663fa.dll windows x86
d32b06b70fa3689e9af223f0d267ec46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetProcAddress
LoadLibraryA
GetTempPathA
CreateThread
lstrcpyA
WriteFile
FlushFileBuffers
DeleteFileW
GetModuleHandleW
GetLastError
IsWow64Process
CloseHandle
ExitProcess
lstrcmpA
FlushViewOfFile
CreateFileW
GetModuleHandleA
DeleteFileA
CreateFileA
GetTickCount
CreateProcessA
MoveFileExW
GetCurrentProcess
WaitForSingleObject
MultiByteToWideChar
lstrcatA
GetSystemDirectoryA
GetModuleFileNameW
CopyFileW
GetVolumeInformationA
IsBadReadPtr
DeviceIoControl
InitializeCriticalSection
GetComputerNameA
WriteConsoleW
SetStdHandle
ReadFile
GetStringTypeW
LCMapStringW
HeapReAlloc
HeapSize
GetConsoleMode
Sleep
WideCharToMultiByte
HeapFree
HeapAlloc
GetCurrentThreadId
DecodePointer
GetCommandLineA
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
SetFilePointer
GetConsoleCP
user32
GetLastInputInfo
wsprintfA
EnumDisplayDevicesA
advapi32
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFileExistsW
StrStrA
PathFileExistsA
StrCatW
PathAppendA
netapi32
NetApiBufferFree
NetWkstaTransportEnum
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ