_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
e8e2449a3ea69e7740af5a9f66c98d9f2e7e7cbe195f2b773c69d8b3b4c1d670.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8e2449a3ea69e7740af5a9f66c98d9f2e7e7cbe195f2b773c69d8b3b4c1d670.dll
Resource
win10v2004-20220901-en
General
-
Target
e8e2449a3ea69e7740af5a9f66c98d9f2e7e7cbe195f2b773c69d8b3b4c1d670
-
Size
21KB
-
MD5
4da82f0ce75d7135330bbc5c3370866e
-
SHA1
30a04fafc772143e85dcd83b1eaf9e1d9e810618
-
SHA256
e8e2449a3ea69e7740af5a9f66c98d9f2e7e7cbe195f2b773c69d8b3b4c1d670
-
SHA512
1e3a07e2ec3eb180f798db70a27b4c29c23fa060d6ee41a04e1efc3a30b4ee36674a60186bb9a48eb7bd0e4e0a7a06a4d6c190f29ac82adfa9600858de780d79
-
SSDEEP
384:J3edse+KWNVaQsRVEIJZ/18ApllV/i3HQwkfrmiB9+:J3OsemNVavRTJpl7oHQxfqiS
Malware Config
Signatures
Files
-
e8e2449a3ea69e7740af5a9f66c98d9f2e7e7cbe195f2b773c69d8b3b4c1d670.dll windows x86
71aa2b6654f03bda63c101d6584015d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
SetEvent
WaitForSingleObject
CreateEventA
CreateMutexA
CreateThread
LoadLibraryA
GetModuleFileNameA
DisableThreadLibraryCalls
VirtualFree
VirtualProtect
VirtualAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
Module32First
VirtualQuery
GetSystemInfo
GetCurrentProcess
WinExec
WriteFile
CreateFileA
GetTempFileNameA
GetShortPathNameA
GetTempPathA
InterlockedPopEntrySList
InterlockedPushEntrySList
InitializeSListHead
CreateFileMappingA
FreeLibrary
ResetEvent
ReleaseMutex
GetCurrentThread
SetThreadPriority
FreeLibraryAndExitThread
MapViewOfFile
UnmapViewOfFile
CloseHandle
Module32Next
user32
SetWindowsHookExA
UnhookWindowsHookEx
ShowWindow
UpdateWindow
CreateWindowExA
RegisterClassA
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
DeleteUrlCacheEntry
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
urlmon
URLDownloadToFileA
ws2_32
setsockopt
WSACleanup
closesocket
msvcrt
_snprintf
strlen
_ismbcprint
_mbscmp
_mbsupr
time
memset
__CxxFrameHandler
_memicmp
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
strcat
_ismbcspace
_mbsinc
memmove
sprintf
abs
memcmp
strcpy
_mbsstr
_mbsicmp
_mbsrchr
_local_unwind2
memcpy
??2@YAPAXI@Z
_except_handler3
_mbsnbcpy
Exports
Exports
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ