HandleCode
Static task
static1
Behavioral task
behavioral1
Sample
996894e3d8640074424b13d97c019af72576af891c3175017fcbbc380a27a739.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
996894e3d8640074424b13d97c019af72576af891c3175017fcbbc380a27a739.dll
Resource
win10v2004-20220901-en
General
-
Target
996894e3d8640074424b13d97c019af72576af891c3175017fcbbc380a27a739
-
Size
312KB
-
MD5
4d98489fc7fc3780c731e32782d338d0
-
SHA1
78b747e7c29f4650bf48ef7d5f07bd0adec02bb0
-
SHA256
996894e3d8640074424b13d97c019af72576af891c3175017fcbbc380a27a739
-
SHA512
441204cb25dc6f1d23c48f1ccabaab7f9bd86d272dbb7500fe24f497ff4166352ddb302626361e35c35f7e8cb9013a41a3612b5e57cdd8e9428154f68ce564af
-
SSDEEP
6144:KZ4zytbxfl9b3B39f0ONkkxF5/b78hTrc5v9:I4zkJLB39fd5jg9rcT
Malware Config
Signatures
Files
-
996894e3d8640074424b13d97c019af72576af891c3175017fcbbc380a27a739.dll windows x86
3270df5bba08cac6d71236c7e161a4e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFileEx
OpenFile
_lcreat
_lopen
_hread
_llseek
GetFileSize
lstrcmpA
GetProcAddress
Sleep
QueryPerformanceCounter
WriteFile
FreeLibrary
LoadLibraryA
GetLocalTime
SetFileTime
GetFileTime
SetFileAttributesA
GetFileAttributesA
FindClose
lstrcmpiA
FindFirstFileA
CreateThread
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
SetThreadPriority
GetDriveTypeA
GetLogicalDriveStringsA
CreateSemaphoreA
DeleteFileA
GetExitCodeThread
CopyFileA
CreateDirectoryA
GetCurrentProcessId
SetEndOfFile
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateThread
CloseHandle
SetFilePointer
GetModuleFileNameA
GetModuleHandleA
CreateFileA
ReadFile
VirtualProtect
FindNextFileA
GetLastError
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
InterlockedDecrement
GetEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
advapi32
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptGenKey
CryptImportKey
CryptExportKey
GetUserNameA
shell32
SHGetSpecialFolderPathA
ws2_32
WSAStartup
WSACleanup
gethostname
bind
socket
gethostbyname
inet_ntoa
inet_addr
htons
connect
WSACreateEvent
WSAEventSelect
WSAEnumNetworkEvents
accept
shutdown
closesocket
recv
send
listen
iphlpapi
GetAdaptersInfo
shlwapi
StrToIntA
PathAppendA
PathFindFileNameA
Exports
Exports
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE