StrongNameGetBlobFromImage
Static task
static1
Behavioral task
behavioral1
Sample
42ef1dd01dd3f07ab04111e0dc6fd46cba2e02cd0c9cd01d76cc34daea2d77d9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42ef1dd01dd3f07ab04111e0dc6fd46cba2e02cd0c9cd01d76cc34daea2d77d9.dll
Resource
win10v2004-20220901-en
General
-
Target
42ef1dd01dd3f07ab04111e0dc6fd46cba2e02cd0c9cd01d76cc34daea2d77d9
-
Size
160KB
-
MD5
e54e00d14c7879fab94159757f90c28a
-
SHA1
01566d957ed713caa5167aaf1232a38b358f9070
-
SHA256
42ef1dd01dd3f07ab04111e0dc6fd46cba2e02cd0c9cd01d76cc34daea2d77d9
-
SHA512
2e09049c7727ea53b1e343edf7e546105be75ba2fcadb23325358b9d9fa3be480f92c62736218e143f79e85558145775dd18f29d020ea8e0bee4cabddbcf68e4
-
SSDEEP
3072:AbiF69Znjyc3yLCFQgoOjzKbHJRZ7x1ULq4o5OTBtAen8lV:WIOxpyLCGHtpH7vGqiOV
Malware Config
Signatures
Files
-
42ef1dd01dd3f07ab04111e0dc6fd46cba2e02cd0c9cd01d76cc34daea2d77d9.dll windows x64
015f58f48dbf2dd24be1383d2bc05253
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileW
CreateMailslotW
CreateSemaphoreA
CreateToolhelp32Snapshot
CreateWaitableTimerA
DecodePointer
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FindResourceW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLongPathNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetThreadContext
GetUserDefaultLCID
GetUserGeoID
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeProcThreadAttributeList
InitializeSListHead
InterlockedFlushSList
IsBadReadPtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LockResource
MultiByteToWideChar
OpenProcess
Process32FirstW
Process32NextW
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSemaphore
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetThreadContext
SetUnhandledExceptionFilter
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UpdateProcThreadAttribute
VirtualFreeEx
VirtualLock
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleW
WriteFile
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
user32
EnableWindow
GetSysColor
LoadIconW
LoadImageW
LoadStringW
Exports
Exports
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ