Static task
static1
Behavioral task
behavioral1
Sample
3d3dc377fdf92bf4dd4c106330390a575dafdcb8d7c63d5ad604b2bdbc50b368.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d3dc377fdf92bf4dd4c106330390a575dafdcb8d7c63d5ad604b2bdbc50b368.dll
Resource
win10v2004-20220812-en
General
-
Target
3d3dc377fdf92bf4dd4c106330390a575dafdcb8d7c63d5ad604b2bdbc50b368
-
Size
38KB
-
MD5
91e845914c67d8976602f7d0bf655853
-
SHA1
4dd0d49f70c7edc917149ab8031915ee0c0ea579
-
SHA256
3d3dc377fdf92bf4dd4c106330390a575dafdcb8d7c63d5ad604b2bdbc50b368
-
SHA512
3db160ef053fec44ef3738cfb309aa7b211a4d98d46f8f5a24fcc88d554e574e2fce0bad9123f222412741a965bb912597b73ec6759821a058af7d7e33755662
-
SSDEEP
768:HhVRMIZoBmN6Mm9uohTmRwP8/usWbbLYhAvwPVOqkTPqhQ:rar5Mm9uoh8P/NWXLGPVO/TPqG
Malware Config
Signatures
Files
-
3d3dc377fdf92bf4dd4c106330390a575dafdcb8d7c63d5ad604b2bdbc50b368.dll windows x86
9cd45322118635a3de03a2d615b3db4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetLastError
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetDriveTypeW
SetErrorMode
FindNextFileW
CreateProcessW
VirtualAlloc
CreateProcessA
lstrcatA
GetComputerNameW
GetProcAddress
LoadLibraryA
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
DeleteCriticalSection
HeapFree
HeapAlloc
GetProcessHeap
user32
wsprintfW
msvcrt
__CxxFrameHandler
sprintf
??2@YAPAXI@Z
strncpy
_except_handler3
wcscat
wcslen
wcscpy
fclose
fwrite
_wfopen
fread
rewind
ftell
fseek
wcscmp
memcpy
strstr
strcmp
memmove
strncmp
_CxxThrowException
atol
fopen
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
??3@YAXPAX@Z
strcat
strlen
malloc
memset
strcpy
free
_strlwr
_itoa
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetOpenA
HttpSendRequestA
InternetSetCookieA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetWriteFile
HttpSendRequestExA
HttpQueryInfoA
InternetReadFile
InternetAttemptConnect
HttpEndRequestA
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ