ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
72586d7352f98b23439539d11a416b6d120eef0bd5bdfc187be15563db5d9927.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72586d7352f98b23439539d11a416b6d120eef0bd5bdfc187be15563db5d9927.dll
Resource
win10v2004-20220901-en
General
-
Target
72586d7352f98b23439539d11a416b6d120eef0bd5bdfc187be15563db5d9927
-
Size
75KB
-
MD5
708ce28ff8399152c326b913a55e7d99
-
SHA1
5ac45c52f3742eb1fef80a43c0661d936580dfb9
-
SHA256
72586d7352f98b23439539d11a416b6d120eef0bd5bdfc187be15563db5d9927
-
SHA512
1b3825437839550602a85330319ab686c7bf2de871e544920bebb9475a78ab419bd2a8a4134c8590bc7de7e549b047cab3e6c630d8be6ddbb38bc2480c4be6c7
-
SSDEEP
1536:wY2Ky91448c7Po+m2gFxtL7qyjc1lofvSEJSEAa97MiY/RsP:kN91bPo+VgF3qyjqlSvSEsra97MiY/R+
Malware Config
Signatures
Files
-
72586d7352f98b23439539d11a416b6d120eef0bd5bdfc187be15563db5d9927.dll windows x86
cccd038e6d39d45b9bb70e143965a9c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA
GetCurrentProcess
CreateProcessA
MapViewOfFile
CreateFileMappingA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
TerminateThread
ReadFile
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
TerminateProcess
WaitForMultipleObjects
LocalSize
OpenProcess
CreateToolhelp32Snapshot
lstrcmpiA
Process32First
GetCurrentThreadId
SetLastError
GetModuleFileNameA
GlobalAlloc
MoveFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
OutputDebugStringA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetProcAddress
FreeLibrary
lstrcatA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LoadLibraryA
GetVersionExA
lstrlenA
FreeConsole
GetTickCount
SetUnhandledExceptionFilter
CreateMutexA
SetErrorMode
OpenEventA
ReleaseMutex
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
InitializeCriticalSection
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GlobalSize
user32
wsprintfA
SetProcessWindowStation
OpenWindowStationA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetProcessWindowStation
GetSystemMetrics
GetActiveWindow
GetKeyNameTextA
UnhookWindowsHookEx
BlockInput
LoadCursorA
SendMessageA
SystemParametersInfoA
DestroyCursor
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
ExitWindowsEx
IsWindowVisible
CharNextA
GetWindowTextA
gdi32
DeleteDC
CreateDIBSection
GetDIBits
CreateCompatibleBitmap
BitBlt
DeleteObject
SelectObject
CreateCompatibleDC
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
shell32
SHGetFileInfoA
ws2_32
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
getsockname
gethostname
send
select
recv
ntohs
closesocket
socket
msvcrt
_ftol
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_access
strcat
strcpy
strcmp
strrchr
_except_handler3
free
strchr
atoi
realloc
strncpy
wcstombs
malloc
_CxxThrowException
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_strcmpi
ceil
memmove
memcpy
??3@YAXPAX@Z
wininet
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ