Static task
static1
Behavioral task
behavioral1
Sample
cd10b59e553c567a7a20706f00812ce48ec9a3876c61b4f111d61efbb9afec87.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd10b59e553c567a7a20706f00812ce48ec9a3876c61b4f111d61efbb9afec87.dll
Resource
win10v2004-20220812-en
General
-
Target
cd10b59e553c567a7a20706f00812ce48ec9a3876c61b4f111d61efbb9afec87
-
Size
28KB
-
MD5
4cf47e7e6df34253848f4ec3619f298f
-
SHA1
a38e85eaef069031271d5ecb10254907c0b00059
-
SHA256
cd10b59e553c567a7a20706f00812ce48ec9a3876c61b4f111d61efbb9afec87
-
SHA512
e6d7fdb492ba176a1521b5e7cda1db27d3d659d3b5e4416221869448df9114b098f862db69159ce8e5c012f843fdbbccd96b18597fba6966f301964872e35025
-
SSDEEP
384:g/XtcS6OMvtCY0107wRq0xOLt9Sg1/YISsKAGuBBQARQkc3CiamVRW6:g/XtevsqS4dSbAxBBQARQkAdamVRt
Malware Config
Signatures
Files
-
cd10b59e553c567a7a20706f00812ce48ec9a3876c61b4f111d61efbb9afec87.dll windows x86
7c98dc6964fa7ef533d1773b732c9409
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
atoi
sscanf
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
gethostname
wininet
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
IsBadReadPtr
TerminateThread
Sleep
ReadProcessMemory
OpenProcess
LeaveCriticalSection
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
InitializeCriticalSection
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteCriticalSection
EnterCriticalSection
WriteFile
user32
GetWindowTextA
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
wsprintfA
CallNextHookEx
FindWindowA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 878B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ