Behavioral task
behavioral1
Sample
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll
Resource
win7-20240903-en
General
-
Target
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a
-
Size
57KB
-
MD5
286d8a826e1c662fd15af99cb487bb16
-
SHA1
05a9d083147226d1581927d81efbd4c29235547a
-
SHA256
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a
-
SHA512
e6785872ed0a01bccdb539ecc67ff17bfd645001e6426a1222450f00148bc1dfa4ea98f9f7447579172e8dff89c2c39c2990f8514b2922eec31f150ca5fa7575
-
SSDEEP
1536:3nWXeV9s1QKDmYKbUO+qO/pmUx+VT0ypopk:lAvmY4YseW0U+
Malware Config
Signatures
Files
-
906798bca75050b212bbd86a7ef76902dbfbb09b2581220516128e3bb458250a.dll windows:6 windows x86 arch:x86
8f9a124a88878ac62589c50d13924ff4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
qsort
bsearch
wcslen
kernel32
VirtualFree
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ExitProcess
VirtualAlloc
VirtualProtect
VirtualQuery
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
IsBadReadPtr
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ