Run
Static task
static1
Behavioral task
behavioral1
Sample
2c530adb841114366ce6177ce964a5e6.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2c530adb841114366ce6177ce964a5e6.dll
Resource
win10v2004-20230220-en
General
-
Target
2c530adb841114366ce6177ce964a5e6.bin
-
Size
223KB
-
MD5
2c530adb841114366ce6177ce964a5e6
-
SHA1
5b69e3e5f4f49cf8b635a57a8c92e17a4f130d50
-
SHA256
873b8fb97b4b0c6d7992f6af15653295788526def41f337c651dc64e8e4aeebd
-
SHA512
002ba1e7b6a1a250678bfe63ae8de106606bc540ab10d69abdb0b4f87e72c79f91cc7890f6e649226cef9d2fec3f5c5176c254e726ce6eaf3dc9d73b12408c65
-
SSDEEP
6144:8L7OMNsdhZlmRDbwE0GCT7rxrvxWYcJM/x:8+M2djEJQr1Y7
Malware Config
Signatures
Files
-
2c530adb841114366ce6177ce964a5e6.bin.dll windows x86
e18a559b91d7b0499fd6731beffecdb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
RaiseException
DecodePointer
GetProcAddress
DeleteCriticalSection
TerminateProcess
Sleep
GetVersionExA
GlobalAlloc
GlobalFree
CloseHandle
VirtualAllocEx
ReadProcessMemory
GetLastError
GetTempPathA
DeleteFileA
SetFileAttributesA
GetTempFileNameA
CreateThread
ReadFile
WriteConsoleW
GetStringTypeW
GetCommandLineW
GetCommandLineA
GetProcessHeap
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
InterlockedFlushSList
SetLastError
RtlUnwind
CreateFileW
GetFileType
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
GetStdHandle
FlushFileBuffers
GetACP
SetStdHandle
SetEndOfFile
GetFileAttributesExW
HeapSize
HeapReAlloc
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionEx
user32
ShowWindow
shell32
SHGetSpecialFolderPathA
shlwapi
PathAppendA
StrStrIA
advapi32
SystemFunction036
Exports
Exports
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ