insthook
Static task
static1
Behavioral task
behavioral1
Sample
57170695296f08287c9cd0b635cd30dec8d4343b33d89d539e60d040d9da9191.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57170695296f08287c9cd0b635cd30dec8d4343b33d89d539e60d040d9da9191.dll
Resource
win10v2004-20220812-en
General
-
Target
57170695296f08287c9cd0b635cd30dec8d4343b33d89d539e60d040d9da9191
-
Size
60KB
-
MD5
6f7d561797b1016fe8238ad9c1049840
-
SHA1
ec6dc8f528a17ae6cd7cc5f12d790ff51a04adf4
-
SHA256
57170695296f08287c9cd0b635cd30dec8d4343b33d89d539e60d040d9da9191
-
SHA512
d2e51f08e23e54963feb6c04bab0b2cf32531e999f7c98699610084ca059d054c7f18b3131311abae3a3836f9a2c62f03d82546eee0fcb21dc92d2d69d1f36fe
-
SSDEEP
1536:UmwO2aGkdgKjvNAtfIPeg18GTufUd0ugjW1IG7oCt:Rwqci3ga1IG7oCt
Malware Config
Signatures
Files
-
57170695296f08287c9cd0b635cd30dec8d4343b33d89d539e60d040d9da9191.dll windows x86
de76a42aabc4a7d04194399a539915f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
Sleep
LCMapStringW
LCMapStringA
RtlUnwind
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
GetPrivateProfileStringA
lstrcatA
GetModuleFileNameA
GetSystemDirectoryA
CreateThread
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateFileA
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
VirtualFree
HeapCreate
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetLastError
CloseHandle
InitializeCriticalSection
WriteFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
ReadFile
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
user32
ToAscii
GetKeyState
GetKeyboardState
CallNextHookEx
GetForegroundWindow
PtInRect
ScreenToClient
GetCursorPos
GetClientRect
wsprintfA
SetCursorPos
GetWindowThreadProcessId
UnhookWindowsHookEx
GetWindowTextA
GetDesktopWindow
GetWindowDC
ClientToScreen
ReleaseDC
SetWindowsHookExA
gdi32
GetPixel
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
recv
send
WSACleanup
closesocket
connect
inet_addr
htons
socket
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shared Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ