ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
005927893fb33a9b332b1a491bcb07579234dd6f7b97be587e366b03011a5865.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
005927893fb33a9b332b1a491bcb07579234dd6f7b97be587e366b03011a5865.dll
Resource
win10v2004-20220812-en
General
-
Target
005927893fb33a9b332b1a491bcb07579234dd6f7b97be587e366b03011a5865
-
Size
108KB
-
MD5
700049163332bd32bf163e2fb37bb5ae
-
SHA1
852b3f456e0ab3e2714a9afe5a06d7d8356c09c5
-
SHA256
005927893fb33a9b332b1a491bcb07579234dd6f7b97be587e366b03011a5865
-
SHA512
22c679c077ee773c5fb7651be57866ead221797c25d2f5c79113efce61c7f64f38c0730127d4ce65247f876dabb6ad90b1fc3f89f78f688ecee0164b8784d2ef
-
SSDEEP
1536:ZTbGRZSBBEzzEhXU3LZII2WGfIwlG1CitcVlPffX8n9xiiVRo7J:ZTbGZlmU3LZwmCitel3fX82iVR4J
Malware Config
Signatures
Files
-
005927893fb33a9b332b1a491bcb07579234dd6f7b97be587e366b03011a5865.dll windows x86
14cdb57b865bc9d2e2460b5f86cc9fa0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
TerminateThread
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
ExitThread
GetTickCount
MoveFileExA
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
OutputDebugStringA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetTempPathA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
RaiseException
CloseHandle
MoveFileA
CreateEventA
msvcrt
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
strncpy
atoi
strncmp
sprintf
_errno
memcmp
rand
srand
time
strncat
realloc
wcstombs
_beginthreadex
calloc
_initterm
_adjust_fdiv
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
_strnicmp
_strrev
memset
??2@YAPAXI@Z
_strcmpi
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICCompressorFree
ICSeqCompressFrameEnd
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICClose
Exports
Exports
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ