CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
cd35db81e115abd38db0aa07a8440a47f79821bf410cc66b39ed2f93b7589ca4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd35db81e115abd38db0aa07a8440a47f79821bf410cc66b39ed2f93b7589ca4.dll
Resource
win10v2004-20220812-en
General
-
Target
cd35db81e115abd38db0aa07a8440a47f79821bf410cc66b39ed2f93b7589ca4
-
Size
484KB
-
MD5
688e6a1b96864193ff48f01e5238ebaf
-
SHA1
722efcccfa9927e1cb7499268597e0ea609d4217
-
SHA256
cd35db81e115abd38db0aa07a8440a47f79821bf410cc66b39ed2f93b7589ca4
-
SHA512
98f9a589381c267d3c8d5b44d3c53fbb64e3af0d787e4968a960d74f83e02e10c76d98979130202f2cd03b6d23a7aa057bab2dfcbb070b1a9358ea2af7e58c56
-
SSDEEP
12288:+wnCFKENlcW7MC227bA95U1Im3pHQCaOOfD:CNlJMC22XA9k9IhD
Malware Config
Signatures
Files
-
cd35db81e115abd38db0aa07a8440a47f79821bf410cc66b39ed2f93b7589ca4.dll windows x86
74b9a6d701a7ddb822eb54fa5262fd5d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
HeapAlloc
GetProcessHeap
CloseHandle
WaitForSingleObject
CreateProcessA
GetTempPathA
SetThreadPriority
CreateThread
WaitForMultipleObjects
GetModuleFileNameA
CreateFileA
InterlockedDecrement
Sleep
InterlockedIncrement
SetUnhandledExceptionFilter
GetNumberOfConsoleInputEvents
PeekConsoleInputA
SetConsoleMode
ReadConsoleInputA
InitializeCriticalSection
EnterCriticalSection
OutputDebugStringA
LeaveCriticalSection
GetCurrentProcess
TerminateProcess
SetConsoleTextAttribute
GetStdHandle
GetConsoleScreenBufferInfo
SetEndOfFile
GetStringTypeW
GetStringTypeA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetExitCodeProcess
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
LoadLibraryExA
FreeLibrary
LoadLibraryA
GetComputerNameA
GetPriorityClass
GetTickCount
GetEnvironmentVariableA
SetEvent
ResetEvent
CreateEventA
DeleteCriticalSection
LocalFree
FormatMessageA
GetLastError
GetCurrentThread
ResumeThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetFullPathNameA
CreateDirectoryA
FindNextFileA
ExitProcess
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
GetFileAttributesA
UnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetFileType
GetStartupInfoA
RtlUnwind
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
tier0
Plat_FloatTime
CommandLine_Tier0
SpewOutputFunc
GetSpewOutputColor
AssertValidStringPtr
_AssertValidWritePtr
ThreadWaitForObjects
Plat_IsInDebugSession
ReleaseThreadHandle
CreateSimpleThread
GetThreadedLoadLibraryFunc
g_ClockSpeed
ThreadInterlockedAssignIf64
Plat_MSTime
g_ClockSpeedSecondsMultiplier
Plat_SetThreadName
Warning
Error
Msg
g_pMemAlloc
?DevMsg@@YAXPBDZZ
ws2_32
socket
ioctlsocket
bind
WSASendTo
setsockopt
recvfrom
select
sendto
WSASocketA
WSAGetLastError
connect
listen
WSASend
WSARecv
WSAGetOverlappedResult
accept
closesocket
gethostbyname
ntohs
htons
WSAStartup
user32
RegisterClassExA
CreateWindowExA
ShowWindow
PeekMessageA
DispatchMessageA
TranslateMessage
InvalidateRect
BeginPaint
EndPaint
DefWindowProcA
SetWindowTextA
LoadCursorA
gdi32
GetStockObject
CreateSolidBrush
SelectObject
DeleteObject
Rectangle
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
vstdlib
RandomSeed
RandomInt
KeyValuesSystem
Exports
Exports
Sections
.text Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE