Static task
static1
Behavioral task
behavioral1
Sample
f49f2443f24dfad33b7de3eda1897471572b23331982561a00e847c74ea06d34.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f49f2443f24dfad33b7de3eda1897471572b23331982561a00e847c74ea06d34.dll
Resource
win10v2004-20220901-en
General
-
Target
f49f2443f24dfad33b7de3eda1897471572b23331982561a00e847c74ea06d34
-
Size
135KB
-
MD5
0b01772e08e991a0734bbae8baaaf768
-
SHA1
0788b61c809bfefb083b7e9d08565edcdb69e0b4
-
SHA256
f49f2443f24dfad33b7de3eda1897471572b23331982561a00e847c74ea06d34
-
SHA512
f06b233053bcf93e939db625c47cb302a99700f8bce036537517aefdca462493ac60289124abd84466e2bf2ddccb4b4dde1cc5980a8e5631cb122a0dbb16274e
-
SSDEEP
1536:+1IMTIjIjkuvfZ/AuwGPtcbdr9+ozFKS4IkDHj/cRszQ5GDAm+3VL+D:WpM8xvfGGG5FinHj/UIAmQ
Malware Config
Signatures
Files
-
f49f2443f24dfad33b7de3eda1897471572b23331982561a00e847c74ea06d34.dll windows x86
b2e74dcd2d4818471932c6706d8625d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
Sleep
OpenProcess
WideCharToMultiByte
GlobalUnlock
DeleteFileA
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GetWindowsDirectoryA
GlobalAlloc
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
MoveFileExA
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GetLastError
SetErrorMode
GlobalLock
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
ExitProcess
Process32Next
IsBadReadPtr
user32
GetWindowTextA
PostMessageA
wsprintfA
GetWindowThreadProcessId
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetOpenUrlW
InternetOpenW
ws2_32
inet_ntoa
getpeername
advapi32
OpenProcessToken
RegCloseKey
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
msvcrt
time
srand
strcmp
atoi
__CxxFrameHandler
??3@YAXPAX@Z
wcscmp
wcslen
strchr
strstr
strrchr
strcat
memcpy
memset
sprintf
strlen
strcpy
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ