HandleCode
Static task
static1
Behavioral task
behavioral1
Sample
06049a57aad33a3b87f570c602548e774fba86b29045ea33300c036ca50ebc42.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06049a57aad33a3b87f570c602548e774fba86b29045ea33300c036ca50ebc42.dll
Resource
win10v2004-20220812-en
General
-
Target
06049a57aad33a3b87f570c602548e774fba86b29045ea33300c036ca50ebc42
-
Size
108KB
-
MD5
762ac07208ce64be571a2145a865058c
-
SHA1
d240f15385be8566cf33b67f33e2fae07dbeba5c
-
SHA256
06049a57aad33a3b87f570c602548e774fba86b29045ea33300c036ca50ebc42
-
SHA512
cbddd1356278eb4b6d884fdcdb0853de64ab184df916ca9bf259a60e1d41a0d5f4d95cebb711b474b99d51487abea1a2cb842a460637cc91a90c78de2692673f
-
SSDEEP
1536:lFDUIYkK4cEui1gNNx0eW6QPB/4ZW1ck8zHhTduu+qjuk9WkD2ofx9:7hYZ4z1sxtbjuUWnoZ9
Malware Config
Signatures
Files
-
06049a57aad33a3b87f570c602548e774fba86b29045ea33300c036ca50ebc42.dll windows x86
3270df5bba08cac6d71236c7e161a4e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFileEx
OpenFile
_lcreat
_lopen
_hread
_llseek
GetFileSize
lstrcmpA
GetProcAddress
Sleep
QueryPerformanceCounter
WriteFile
FreeLibrary
LoadLibraryA
GetLocalTime
SetFileTime
GetFileTime
SetFileAttributesA
GetFileAttributesA
FindClose
lstrcmpiA
FindFirstFileA
CreateThread
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
SetThreadPriority
GetDriveTypeA
GetLogicalDriveStringsA
CreateSemaphoreA
DeleteFileA
GetExitCodeThread
CopyFileA
CreateDirectoryA
GetCurrentProcessId
SetEndOfFile
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateThread
CloseHandle
SetFilePointer
GetModuleFileNameA
GetModuleHandleA
CreateFileA
ReadFile
VirtualProtect
FindNextFileA
GetLastError
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
InterlockedDecrement
GetEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
advapi32
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptGenKey
CryptImportKey
CryptExportKey
GetUserNameA
shell32
SHGetSpecialFolderPathA
ws2_32
WSAStartup
WSACleanup
gethostname
bind
socket
gethostbyname
inet_ntoa
inet_addr
htons
connect
WSACreateEvent
WSAEventSelect
WSAEnumNetworkEvents
accept
shutdown
closesocket
recv
send
listen
iphlpapi
GetAdaptersInfo
shlwapi
StrToIntA
PathAppendA
PathFindFileNameA
Exports
Exports
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ