Static task
static1
Behavioral task
behavioral1
Sample
7faec72f273cf418d2928bbbff6c36d2375db146a1a0308d81ac9ca0db44fbaf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7faec72f273cf418d2928bbbff6c36d2375db146a1a0308d81ac9ca0db44fbaf.dll
Resource
win10v2004-20220812-en
General
-
Target
7faec72f273cf418d2928bbbff6c36d2375db146a1a0308d81ac9ca0db44fbaf
-
Size
30KB
-
MD5
ccf25269809887c5a67c229352adf20f
-
SHA1
21267f58f4a46f6ed412e86b12645ac385cf9b0b
-
SHA256
7faec72f273cf418d2928bbbff6c36d2375db146a1a0308d81ac9ca0db44fbaf
-
SHA512
ae943c819cdd8fa303d061ee6112ce0c984148fab832375c2f44ddbe6f1450d0ac42ccb71465172df45f84caa4b79673b052ecc691f6b627da0c48f7a956be08
-
SSDEEP
384:LyfXYGPKLvM1TunFXg666HmH14wawlp5dv7zoahf5/3B4z9MPTKCR9LuBBQARQkt:LyfXYGCd4VLVl/wC2BBQARQkVX7Ve
Malware Config
Signatures
Files
-
7faec72f273cf418d2928bbbff6c36d2375db146a1a0308d81ac9ca0db44fbaf.dll windows x86
d96b43c56d8e0fab8cd69126339b5b8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
sscanf
strstr
RtlDeleteElementGenericTable
RtlNumberGenericTableElements
RtlGetElementGenericTable
RtlInitializeGenericTable
RtlInsertElementGenericTable
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
IsBadReadPtr
CreateFileMappingA
GetPrivateProfileStringA
lstrcmpA
TerminateThread
Sleep
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
GlobalAlloc
GlobalFree
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
LoadLibraryA
MoveFileExA
ReadFile
lstrcatA
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ