Static task
static1
Behavioral task
behavioral1
Sample
3c4a9d74976a7d2d678a6e700a92c81842a040538a0e9344f00e5ea413f9c113.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c4a9d74976a7d2d678a6e700a92c81842a040538a0e9344f00e5ea413f9c113.dll
Resource
win10v2004-20220812-en
General
-
Target
3c4a9d74976a7d2d678a6e700a92c81842a040538a0e9344f00e5ea413f9c113
-
Size
24KB
-
MD5
4b040a60b76fc7040e26005b349f8240
-
SHA1
a60599aa7cb5c80a8749deb002775702a47e0834
-
SHA256
3c4a9d74976a7d2d678a6e700a92c81842a040538a0e9344f00e5ea413f9c113
-
SHA512
bccbc99dc2f925835d645305c0afb1f8f1961d8d3835772c6eb97ccdd9f0c2b70a0dee3873b58ed21f4bb6b91f252c69563d1da7e9813373a1fa3754c3f13f44
-
SSDEEP
192:sBDFlQ02xcDIaY01h06dV3DM6n8Aypct5UYHjU:sBznJDIdEm6nTM2ypct57U
Malware Config
Signatures
Files
-
3c4a9d74976a7d2d678a6e700a92c81842a040538a0e9344f00e5ea413f9c113.dll windows x86
3b38bd1bea942ac286012b435fa0f0b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
free
_initterm
malloc
atoi
memcpy
strncpy
strcmp
strrchr
fseek
ftell
??2@YAPAXI@Z
strstr
??3@YAXPAX@Z
strchr
fopen
fwrite
fclose
fread
time
_adjust_fdiv
memset
_strlwr
_itoa
kernel32
GetModuleHandleA
lstrlenA
LoadLibraryA
CopyFileA
GetProcAddress
CreateThread
GetTempPathA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
lstrcpyA
Sleep
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ