Static task
static1
Behavioral task
behavioral1
Sample
8089a85798bfacaf80b37b8e3eb6d5c4e5d351ae7cd3c24a9492dec9c6328530.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8089a85798bfacaf80b37b8e3eb6d5c4e5d351ae7cd3c24a9492dec9c6328530.dll
Resource
win10v2004-20230220-en
General
-
Target
8089a85798bfacaf80b37b8e3eb6d5c4e5d351ae7cd3c24a9492dec9c6328530
-
Size
346KB
-
MD5
cf30600f7bd158bdd624df774e04d00a
-
SHA1
04d422f0bef13bcf74629ca24552320ac91d5bea
-
SHA256
8089a85798bfacaf80b37b8e3eb6d5c4e5d351ae7cd3c24a9492dec9c6328530
-
SHA512
578d61ca3ec8b20e79e706dbe6a62a29b05225bdff35d76d4bae183a96d4bf775744182d2c477f803a843f5434bbc75d8815d50afb6cac3cd8e1b24aa04ddd12
-
SSDEEP
6144:OOVi/9pDt90M0HOTiprtTQwH7DwX4ATSoW:OOViMHiiVfDwIATm
Malware Config
Signatures
Files
-
8089a85798bfacaf80b37b8e3eb6d5c4e5d351ae7cd3c24a9492dec9c6328530.dll windows x86
2395b7b2936c8ede19d39217b4cfa7d4
Code Sign
13:24:30:14:d1:2b:f2:4e:f0:d4:e5:71:55:0c:db:46:25:7e:fe:6fSigner
Actual PE Digest13:24:30:14:d1:2b:f2:4e:f0:d4:e5:71:55:0c:db:46:25:7e:fe:6fDigest Algorithmsha1PE Digest MatchestrueTrustedfalseSigning CertificateNO CERTIFICATEHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
ExitThread
HeapAlloc
HeapReAlloc
GetCommandLineA
RtlUnwind
RaiseException
VirtualAlloc
HeapSize
ExitProcess
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapCreate
HeapDestroy
VirtualFree
SetHandleCount
GetStdHandle
GetStartupInfoA
UnhandledExceptionFilter
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
FreeEnvironmentStringsA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
InterlockedExchange
GlobalFlags
lstrcmpA
InterlockedIncrement
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrlenA
GetCurrentProcessId
TerminateProcess
ResumeThread
SuspendThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
GetModuleFileNameA
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
Sleep
DeleteFileA
GetTempPathA
CreateThread
CreateProcessA
InterlockedDecrement
WaitForSingleObject
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
FreeLibrary
LoadLibraryA
GetLogicalDriveStringsA
LocalFree
OpenProcess
lstrcmpiA
CreateFileA
GetDriveTypeA
CloseHandle
GetCurrentProcess
OutputDebugStringA
GetWindowsDirectoryA
GetSystemInfo
GetModuleHandleA
GetProcAddress
GetVersionExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetComputerNameA
WideCharToMultiByte
GetFileType
MultiByteToWideChar
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
DestroyMenu
LoadCursorA
GetSysColorBrush
UnregisterClassA
ValidateRect
ReleaseDC
GetDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
IsWindowEnabled
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetSystemMetrics
FindWindowA
EnumChildWindows
EnableWindow
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
SendMessageA
GetClassNameA
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindow
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
GetClientRect
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
gdi32
GetStockObject
DeleteDC
SelectObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetClipBox
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
ExtTextOutA
CreateBitmap
SetBkColor
SetTextColor
GetDeviceCaps
SetViewportOrgEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
GetExplicitEntriesFromAclA
GetSecurityDescriptorDacl
IsValidSecurityDescriptor
RegEnumKeyA
RegDeleteValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
ConvertSidToStringSidA
LookupAccountNameA
LookupAccountSidA
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
shell32
ShellExecuteA
shlwapi
StrToIntA
PathAppendA
PathIsDirectoryA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecA
ole32
CoUninitialize
CoInitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
oleaut32
VariantChangeType
VariantInit
VariantClear
SysFreeString
SysAllocString
wtsapi32
WTSEnumerateSessionsA
WTSFreeMemory
psapi
EnumProcesses
GetProcessImageFileNameA
GetModuleFileNameExA
userenv
CreateEnvironmentBlock
UnloadUserProfile
DestroyEnvironmentBlock
LoadUserProfileA
netapi32
NetUserEnum
NetLocalGroupEnum
NetApiBufferFree
NetShareEnum
Exports
Exports
GetDllVersion
PauseCheck
StartCheck
StopCheck
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ