_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
02d96ae772622c122f07cff787e0c17d4e5445037ef8325d0a9d5ea95c17cf98.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
02d96ae772622c122f07cff787e0c17d4e5445037ef8325d0a9d5ea95c17cf98.dll
Resource
win10v2004-20220812-en
General
-
Target
02d96ae772622c122f07cff787e0c17d4e5445037ef8325d0a9d5ea95c17cf98
-
Size
37KB
-
MD5
a3ad7e282b29c105eb81678d0cf14450
-
SHA1
a50cfccfb1914edd7b92be05314ed03964401a77
-
SHA256
02d96ae772622c122f07cff787e0c17d4e5445037ef8325d0a9d5ea95c17cf98
-
SHA512
82823111fa16fd4465cf154a448a679ef0e72ba12b184e15ed9bc074cc6146a7858cf2ef2fd591484d4109d64bdde03f54ff0ae0bae1fa139665d51adaa5760f
-
SSDEEP
768:cjfV5x+An+Ji8dXoFxFZAFYP/EEj6KD8Qkr:cTV5xd+J3sIGMEJ8Qkr
Malware Config
Signatures
Files
-
02d96ae772622c122f07cff787e0c17d4e5445037ef8325d0a9d5ea95c17cf98.dll windows x86
88404dce8f6bbe9b75ce66c11ddb335f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ResetEvent
WaitForSingleObject
FreeLibraryAndExitThread
SetThreadPriority
GetCurrentThread
ReleaseMutex
FreeLibrary
GetCurrentProcessId
SetEvent
CreateMutexA
SleepEx
CreateThread
GetModuleFileNameA
DisableThreadLibraryCalls
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
InterlockedCompareExchange
VirtualFree
CreateEventA
VirtualAlloc
CreateFileA
DeviceIoControl
WaitForMultipleObjects
FlushFileBuffers
WriteFile
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
VirtualQuery
GetSystemInfo
GetProcAddress
GetCommandLineA
InterlockedExchange
GetPrivateProfileStringA
GetShortPathNameA
GetLastError
GetTempPathA
GetTempFileNameA
Sleep
CreateProcessA
DeleteFileA
OpenEventA
CreateFileMappingA
GetModuleHandleA
GetCurrentProcess
MapViewOfFile
UnmapViewOfFile
CloseHandle
VirtualProtect
user32
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
MapVirtualKeyA
ToAscii
GetKeyState
UnhookWindowsHookEx
SetWindowsHookExA
EnumDesktopWindows
CallNextHookEx
advapi32
OpenServiceA
RegEnumValueA
RegCloseKey
CloseServiceHandle
DeleteService
ControlService
OpenSCManagerA
StartServiceA
CreateServiceA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCrackUrlA
HttpAddRequestHeadersA
urlmon
URLDownloadToFileA
ws2_32
setsockopt
WSACleanup
closesocket
msvcrt
memmove
_mbsinc
memcmp
_ismbcspace
__dllonexit
_onexit
_initterm
_adjust_fdiv
abs
fclose
_mbsnbicmp
malloc
free
strcpy
_mbsstr
printf
_mbscmp
time
_mbsupr
_ismbcprint
_snprintf
memset
_mbsrchr
_local_unwind2
_except_handler3
__CxxFrameHandler
memcpy
??2@YAPAXI@Z
_mbsicmp
_memicmp
strcat
_mbsnbcpy
atoi
_mbstok
strlen
fgets
fopen
sprintf
psapi
GetModuleInformation
Exports
Exports
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ