Static task
static1
Behavioral task
behavioral1
Sample
475b9ebce5bc2b084d64a19a61c06dd05615c82e6bbc0298a78be13f6e20552b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
475b9ebce5bc2b084d64a19a61c06dd05615c82e6bbc0298a78be13f6e20552b.dll
Resource
win10v2004-20220812-en
General
-
Target
475b9ebce5bc2b084d64a19a61c06dd05615c82e6bbc0298a78be13f6e20552b
-
Size
46KB
-
MD5
4729a98c90e7e2b191a22c4f80944e40
-
SHA1
d0b36670e10d23beae74977b5eec8e0e3af0cdff
-
SHA256
475b9ebce5bc2b084d64a19a61c06dd05615c82e6bbc0298a78be13f6e20552b
-
SHA512
0b5fce6b3fa0c677ebf50de8636d78fcdbc626e9d9af25a8161f528786ccf53f5ee82b4124e2580266ddeee1af45bff7fb20391d1c52e20b0e658d0e0f292551
-
SSDEEP
768:OOFPm1GppkC+wLVUoEbimoHxVhlrdO+jn3EqrreSLgvwPVRBvq/n:O6+4pCC+wLVUoEbMhXOu3EqrrecPVRBi
Malware Config
Signatures
Files
-
475b9ebce5bc2b084d64a19a61c06dd05615c82e6bbc0298a78be13f6e20552b.dll windows x86
37a8cdde77195ac2a996218d33549ff3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ExpandEnvironmentStringsA
CreateThread
CloseHandle
GetLastError
DeviceIoControl
CreateFileA
SetPriorityClass
GetCurrentProcess
GetVersionExA
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetDriveTypeW
SetErrorMode
FindNextFileW
FindFirstFileW
CreateProcessW
VirtualAlloc
CreateProcessA
lstrcatA
GetComputerNameW
GetProcAddress
GetStartupInfoA
CreatePipe
DeleteCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
user32
wsprintfW
MessageBoxA
msvcrt
_EH_prolog
__CxxFrameHandler
sprintf
isprint
isspace
tolower
isalnum
strncpy
strstr
strncmp
_except_handler3
wcscat
wcslen
wcscpy
fclose
fwrite
_wfopen
fread
rewind
ftell
fseek
wcscmp
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strcmp
memmove
_CxxThrowException
atol
fopen
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strcat
strlen
malloc
memset
strcpy
free
_strlwr
printf
_itoa
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
wininet
InternetOpenA
HttpSendRequestA
InternetSetCookieA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetWriteFile
HttpSendRequestExA
HttpQueryInfoA
InternetReadFile
InternetAttemptConnect
HttpEndRequestA
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ