Static task
static1
Behavioral task
behavioral1
Sample
9efc844ff997d3d13d8bd789f9d436851766917e389ed1fe7c7a6f2a3dbe0996.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9efc844ff997d3d13d8bd789f9d436851766917e389ed1fe7c7a6f2a3dbe0996.dll
Resource
win10v2004-20220812-en
General
-
Target
9efc844ff997d3d13d8bd789f9d436851766917e389ed1fe7c7a6f2a3dbe0996
-
Size
301KB
-
MD5
68195d44971d38a26adbe3412391f490
-
SHA1
8e3a250992a4d0bbd967fb14e5836d1e4ba4910c
-
SHA256
9efc844ff997d3d13d8bd789f9d436851766917e389ed1fe7c7a6f2a3dbe0996
-
SHA512
12132e64ba06dcdf39fc9c906b2ac8ccdcf66dd7a9509c387d2bbc53d54c6447eb246c49a6ef01fe75c7fdf2af8e6158299c387f8ce76e0432318716b285f578
-
SSDEEP
6144:bmgl8rhDM/2yT/Cw0B2uJ2s4otqFCJrW9FqvSbqsHasHAH3HBHlHDAGtlRXZ+CPg:aU866w0B2uJ2s4otqFCJrW9FqvSbqsH/
Malware Config
Signatures
Files
-
9efc844ff997d3d13d8bd789f9d436851766917e389ed1fe7c7a6f2a3dbe0996.dll windows x86
cd3ac686465b05b369ab87d0724dcd62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
MoveFileWithProgressW
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetSystemTime
GetCurrentProcess
Process32First
WaitForSingleObject
GetLastError
Process32Next
GetExitCodeThread
GetModuleHandleA
DeleteFileW
DuplicateHandle
CloseHandle
MultiByteToWideChar
CreateFileA
SetFilePointer
WaitNamedPipeW
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteFileEx
WinExec
IsDebuggerPresent
DeviceIoControl
LoadLibraryA
VirtualAllocEx
ReadFileEx
GetProcAddress
OpenMutexW
CreateFileW
ReadFile
ReplaceFileW
TerminateProcess
ReadProcessMemory
Sleep
LoadLibraryW
WriteFile
CreateRemoteThread
CopyFileExW
CreateMutexW
CreateToolhelp32Snapshot
ExitProcess
WriteConsoleW
SetStdHandle
RtlUnwind
GetModuleFileNameW
GetTickCount
VirtualProtect
OutputDebugStringA
HeapFree
GetCurrentThreadId
DecodePointer
GetCommandLineA
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
IsProcessorFeaturePresent
HeapAlloc
HeapCreate
HeapDestroy
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
user32
FindWindowW
SetWindowsHookExA
ExitWindowsEx
FindWindowA
SetWindowsHookExW
advapi32
RegEnumKeyExW
ControlService
RegOpenKeyExW
RegEnumValueW
OpenSCManagerA
StartServiceW
RegOpenKeyExA
RegCreateKeyExA
StartServiceA
RegDeleteKeyW
RegDeleteKeyA
RegQueryValueExW
CreateServiceA
RegCreateKeyExW
RegSetValueExA
OpenServiceW
OpenSCManagerW
DeleteService
OpenServiceA
CreateServiceW
RegSetValueExW
shell32
ShellExecuteExW
ShellExecuteExA
ws2_32
ntohl
wininet
InternetOpenUrlW
urlmon
URLDownloadToFileW
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE