Static task
static1
Behavioral task
behavioral1
Sample
d97e9b15752811944792b7663327219d931052288b16f568eee94c7441b7f68d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d97e9b15752811944792b7663327219d931052288b16f568eee94c7441b7f68d.dll
Resource
win10v2004-20220812-en
General
-
Target
d97e9b15752811944792b7663327219d931052288b16f568eee94c7441b7f68d
-
Size
36KB
-
MD5
71014383d57bf6f7ceb7e370d01797c0
-
SHA1
3cb9d9d9f0b8ac6c305d95189c90d1e7d08ff717
-
SHA256
d97e9b15752811944792b7663327219d931052288b16f568eee94c7441b7f68d
-
SHA512
990d11d1ed66931d3494e50e97ad626bf38a8df9a8e3a86031a73b3ad7e4b20e0ecb3089db43f6f3eae8ffb990cd3838ccfee1b9f46a577bfa1b792af111eb92
-
SSDEEP
384:aMbPiREhWx2xRtq1vuSaIggGIP7wvNtLgaqclMh1JYrjLdn/nVa:aMbPi6Ex2xqvudIgxTLgaUSrjRn/
Malware Config
Signatures
Files
-
d97e9b15752811944792b7663327219d931052288b16f568eee94c7441b7f68d.dll windows x86
c3a8e285f01e37e92a9f0c5f5d3b9c57
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6648
ord4129
ord5710
ord926
ord924
ord922
ord537
ord2846
ord2764
ord2915
ord540
ord535
ord858
ord6663
ord860
ord4278
ord800
ord6877
ord2818
ord939
msvcrt
_adjust_fdiv
malloc
_initterm
free
strstr
strncmp
strchr
atoi
rand
srand
strtok
exit
_mbscmp
_local_unwind2
_except_handler3
_iob
fprintf
printf
__CxxFrameHandler
time
kernel32
GetTempPathA
CreateProcessA
GetSystemDirectoryA
TerminateThread
GetCurrentProcess
CreateMutexA
CloseHandle
GetProcessHeap
GlobalMemoryStatus
GetVersionExA
Sleep
GetProcAddress
LoadLibraryA
ExitProcess
ExitThread
GetLastError
GetCurrentProcessId
GetTickCount
CreateThread
HeapAlloc
user32
ExitWindowsEx
wsprintfA
advapi32
ControlService
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
OpenServiceA
OpenSCManagerA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
StartServiceA
urlmon
URLDownloadToFileA
ws2_32
inet_ntoa
ntohl
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
recv
__WSAFDIsSet
setsockopt
WSAStartup
sendto
WSASocketA
gethostname
WSACleanup
htonl
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ