Static task
static1
Behavioral task
behavioral1
Sample
dd95880ecb9075838038a9d2a35b565859c9aa047b234bab3ea52fe80c614356.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd95880ecb9075838038a9d2a35b565859c9aa047b234bab3ea52fe80c614356.dll
Resource
win10v2004-20220812-en
General
-
Target
dd95880ecb9075838038a9d2a35b565859c9aa047b234bab3ea52fe80c614356
-
Size
135KB
-
MD5
84fd1a3113723bba80bdbf2b86672349
-
SHA1
5a8542655422b7f99f6aff5e1cf7d1cd32e88ea3
-
SHA256
dd95880ecb9075838038a9d2a35b565859c9aa047b234bab3ea52fe80c614356
-
SHA512
39bfc5b2d6aaf10d90f34b2208bb42b8debffbc34e399b33014a8c0ac0ab3972b092f88ced3283aa4b5eed09647db2a5d5296315649e3ce9ae1a44e137a5ed05
-
SSDEEP
1536:+fIMTIjIjkuvfZ/AuwGPtcbdr9+ozFKS4IkDHj/cRszQ5GDAm+3VL+D:opM8xvfGGG5FinHj/UIAmQ
Malware Config
Signatures
Files
-
dd95880ecb9075838038a9d2a35b565859c9aa047b234bab3ea52fe80c614356.dll windows x86
b2e74dcd2d4818471932c6706d8625d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
Sleep
OpenProcess
WideCharToMultiByte
GlobalUnlock
DeleteFileA
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GetWindowsDirectoryA
GlobalAlloc
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
MoveFileExA
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GetLastError
SetErrorMode
GlobalLock
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
ExitProcess
Process32Next
IsBadReadPtr
user32
GetWindowTextA
PostMessageA
wsprintfA
GetWindowThreadProcessId
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetOpenUrlW
InternetOpenW
ws2_32
inet_ntoa
getpeername
advapi32
OpenProcessToken
RegCloseKey
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
msvcrt
time
srand
strcmp
atoi
__CxxFrameHandler
??3@YAXPAX@Z
wcscmp
wcslen
strchr
strstr
strrchr
strcat
memcpy
memset
sprintf
strlen
strcpy
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ