Static task
static1
Behavioral task
behavioral1
Sample
618872200020a1912198cb705e9245bd0aeb057cb1e19ffd85ab5c6679e8f6fc.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
618872200020a1912198cb705e9245bd0aeb057cb1e19ffd85ab5c6679e8f6fc.dll
Resource
win10v2004-20230221-en
General
-
Target
618872200020a1912198cb705e9245bd0aeb057cb1e19ffd85ab5c6679e8f6fc
-
Size
148KB
-
MD5
b2d8673ba39e9d46bf58a7dce76ad293
-
SHA1
c2c59abbc8d2147a6de9cfb6544129715374cbba
-
SHA256
618872200020a1912198cb705e9245bd0aeb057cb1e19ffd85ab5c6679e8f6fc
-
SHA512
8b19ee6a17af7629b5b33b4416269f11485df9ad1433dd8c582ec4ff66688a82e31eb1adad14e358cb1f567e856f817046e75376554cc604f7041588bfdf5bba
-
SSDEEP
3072:c23qdR/TBOPom3pSLBZvOdFVt0+a0pH+FzZ:cpd5TBbm3klgdtHwV
Malware Config
Signatures
Files
-
618872200020a1912198cb705e9245bd0aeb057cb1e19ffd85ab5c6679e8f6fc.dll windows x86
d365e54d03e228ba035368d6759f2fce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
ExitProcess
GetProcessHeap
WideCharToMultiByte
CloseHandle
CreateFileW
DeleteFileW
MoveFileW
SetFileAttributesW
FindFirstFileW
GetModuleFileNameW
GetEnvironmentVariableW
lstrcpyW
lstrcatW
Sleep
FindNextFileW
FindClose
CreateDirectoryW
WriteFile
GetVolumeInformationW
DecodePointer
lstrlenW
GetDriveTypeW
K32GetModuleFileNameExW
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
CopyFileW
GetFileAttributesW
CreateProcessA
lstrcmpW
CreateProcessW
OpenEventW
CreateEventW
RemoveDirectoryW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
GetDiskFreeSpaceExW
HeapFree
FlushFileBuffers
SetStdHandle
GetStringTypeW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
SetLastError
RtlUnwind
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
user32
wsprintfW
FindWindowW
PostMessageW
advapi32
CheckTokenMembership
AllocateAndInitializeSid
RegGetValueW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
FreeSid
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ