Static task
static1
Behavioral task
behavioral1
Sample
8b3f2ef1f1c85b4eb1e2e73c0ee2c55e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b3f2ef1f1c85b4eb1e2e73c0ee2c55e.dll
Resource
win10v2004-20231215-en
General
-
Target
8b3f2ef1f1c85b4eb1e2e73c0ee2c55e
-
Size
36KB
-
MD5
8b3f2ef1f1c85b4eb1e2e73c0ee2c55e
-
SHA1
37a86897bb548451541c05c65b93bad30e731335
-
SHA256
3b8b0d41ace644aca28267e355ebed7ec2a9b92e0f5e2fab4ad7e16028410530
-
SHA512
437e5e97c897a5af8caaa2d608b9d3aa38b93dd87978c23c8854b632fc74e4b21c93bf796adcbb2980e44ddf52047f8d030cbef124a74192356c455dc5e0e884
-
SSDEEP
384:A39SgBdxQ4ByM4GUeuoEPgF1kP/TQ8vp9mRt3okmF9LVh+WSI9WtSd7h9QH2z:CvP0oE0k3PmRt4kmRlf2Y
Malware Config
Signatures
Files
-
8b3f2ef1f1c85b4eb1e2e73c0ee2c55e.dll windows:4 windows x86 arch:x86
48bbcdd14d6ed8db4961b32aec9fa189
Code Sign
44:38:fe:e9:eb:ea:da:67:ba:51:db:7e:b7:22:2b:b4Certificate
IssuerCN=Root AgencyNot Before29/03/2010, 01:19Not After31/12/2039, 23:59SubjectCN=Windows VMM 模块Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
CopyFileA
lstrlenA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
GetTickCount
Sleep
LoadLibraryA
GetSystemDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
GetProcAddress
GetVersionExA
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
lstrcatA
user32
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
PtInRect
DestroyMenu
CallWindowProcA
GetWindowLongA
GetTopWindow
GetClassNameA
GetParent
GetWindow
MessageBeep
InvalidateRect
RemoveMenu
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
SetWindowPos
SendMessageA
GetWindowTextA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
SetFocus
PostQuitMessage
wvsprintfA
GetClientRect
LoadAcceleratorsA
DestroyWindow
FindWindowA
ShowWindow
PeekMessageA
LoadStringW
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
OleUninitialize
OleInitialize
msvcrt
atoi
isdigit
wcslen
strstr
_initterm
_purecall
??2@YAPAXI@Z
memmove
realloc
??3@YAXPAX@Z
__CxxFrameHandler
strrchr
free
malloc
_adjust_fdiv
time
Exports
Exports
Aetxml
BetDml
DllRundll
GetDDaa
setxml
sssweew
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ