Start
Behavioral task
behavioral1
Sample
693937e771023341ca985bde234309dd4d5022d4984af16b7f86858d7a17255c.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
693937e771023341ca985bde234309dd4d5022d4984af16b7f86858d7a17255c.dll
Resource
win11-20240412-en
General
-
Target
693937e771023341ca985bde234309dd4d5022d4984af16b7f86858d7a17255c
-
Size
243KB
-
MD5
0a30114329b08c503343a343d9eb6b46
-
SHA1
64aac39b2065b9825cd4e7fff5932487aaa8e56c
-
SHA256
693937e771023341ca985bde234309dd4d5022d4984af16b7f86858d7a17255c
-
SHA512
501c13e96ed3769b06e3d2829da2228f647423979d91accffbf85c6d7be2ee75e164fb7eaff7e58cfc070e5f77850dc42de00206f07d9d17af3eb401e3691cec
-
SSDEEP
6144:16KeVDjvjWpG5W8OBMTSm/LwKrhoty3FupVLZipt0:4ZjbgKW8L/LwKFoKEYpt0
Malware Config
Signatures
Files
-
693937e771023341ca985bde234309dd4d5022d4984af16b7f86858d7a17255c.dll windows:5 windows x86 arch:x86
a8292c6fea28eccd2169562a0a333559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
strlen
??_U@YAPAXI@Z
strcmp
memcmp
__CxxFrameHandler3
strncpy
malloc
_wtoi64
atexit
memchr
memmove
??_V@YAXPAX@Z
strtok_s
strchr
strcpy_s
memcpy
memset
kernel32
IsProcessorFeaturePresent
ExitProcess
lstrlenA
LocalAlloc
ReadProcessMemory
VirtualQueryEx
OpenProcess
FileTimeToSystemTime
CloseHandle
GetDriveTypeA
GetLogicalDriveStringsA
WaitForSingleObject
CreateThread
DisableThreadLibraryCalls
GetProcAddress
LoadLibraryA
HeapAlloc
GetCurrentProcess
HeapFree
LoadLibraryW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetModuleFileNameW
GetStdHandle
WriteFile
RaiseException
EncodePointer
GetLastError
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
GetModuleHandleW
SetLastError
GetCurrentThreadId
Sleep
user32
CharToOemA
advapi32
RegOpenKeyExA
RegGetValueA
GetCurrentHwProfileA
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
ord155
Exports
Exports
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ