Static task
static1
Behavioral task
behavioral1
Sample
337908e1117e4fad7e19a2d320e21055.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
337908e1117e4fad7e19a2d320e21055.dll
Resource
win10v2004-20231215-en
General
-
Target
337908e1117e4fad7e19a2d320e21055
-
Size
45KB
-
MD5
337908e1117e4fad7e19a2d320e21055
-
SHA1
67392b66b7ad45aefb9f7353eea31a87f007d4a0
-
SHA256
6dc53045cf3296f1e2abdc35740aac075efb3d1a5ab48ad943c27209e8f8f8df
-
SHA512
5abf66e443205bcfdc70df8cf7b30156d7e5430a0e5786bcca2f07fcf7cfdcf7a2104078247355fb0a5d479355010c5792a0bc5fa50e324fae1b03ef5dfc36c6
-
SSDEEP
384:c03Q58Vb3bGGsnQHegJyX9hn5k4oLH8BJgSmcDAkrGQhg2wLQ99rW71hWaED5ZG2:clsN+gOkLuBmuAgGQ22wLRzyZsa
Malware Config
Signatures
Files
-
337908e1117e4fad7e19a2d320e21055.dll windows:4 windows x86 arch:x86
6d2d13a66e98747f8fa515ae9b653449
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16-09-2009 07:50Not After31-12-2039 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
GetTickCount
InterlockedDecrement
lstrlenA
Sleep
GetProcAddress
LoadLibraryA
DisableThreadLibraryCalls
GetModuleFileNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
OpenProcess
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
GetVersionExA
InterlockedIncrement
user32
GetClientRect
MessageBeep
DestroyMenu
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
PtInRect
RemoveMenu
CallWindowProcA
GetWindowLongA
GetTopWindow
GetClassNameA
GetParent
GetWindow
InvalidateRect
DispatchMessageA
TranslateMessage
SetWindowPos
CharNextA
SendMessageA
GetWindowTextA
GetCursorPos
SetCursorPos
GetWindowRect
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
wvsprintfA
PostQuitMessage
LoadStringW
DestroyWindow
LoadAcceleratorsA
FindWindowA
ShowWindow
PeekMessageA
GetMessageA
SetFocus
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
msvcrt
atoi
isdigit
wcslen
strrchr
strstr
_initterm
_purecall
??2@YAPAXI@Z
memmove
realloc
__CxxFrameHandler
free
??3@YAXPAX@Z
_except_handler3
malloc
_adjust_fdiv
time
_strcmpi
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
Exports
Exports
DllRundll
setxml
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ