Static task
static1
Behavioral task
behavioral1
Sample
8cfd13c2af75aabc7e6da4dce7eaf9c200637b6c9689ccb9084cb130c4934d8a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cfd13c2af75aabc7e6da4dce7eaf9c200637b6c9689ccb9084cb130c4934d8a.dll
Resource
win10v2004-20220812-en
General
-
Target
8cfd13c2af75aabc7e6da4dce7eaf9c200637b6c9689ccb9084cb130c4934d8a
-
Size
203KB
-
MD5
518bc54023a60f3eac292d8b780fa200
-
SHA1
14ea36cbc770d2c132cb8f1e34126e9e824da07f
-
SHA256
8cfd13c2af75aabc7e6da4dce7eaf9c200637b6c9689ccb9084cb130c4934d8a
-
SHA512
0be59f14be01e44665f274b93f78cdb99f010e523763e87329bada69a5857aa1b6aa55daa5b8bbf46e27185526c1a1766adfb6e309b80fbcce38caf5656b39db
-
SSDEEP
6144:4mgl8rhDM/2yT/Cw0B2uJ2s4otqFCJrW9FqvSbqsHasHAH3HBHlHDAGtlRXZ+CPZ:DU866w0B2uJ2s4otqFCJrW9FqvSbqsHR
Malware Config
Signatures
Files
-
8cfd13c2af75aabc7e6da4dce7eaf9c200637b6c9689ccb9084cb130c4934d8a.dll windows x86
cd3ac686465b05b369ab87d0724dcd62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
MoveFileWithProgressW
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetSystemTime
GetCurrentProcess
Process32First
WaitForSingleObject
GetLastError
Process32Next
GetExitCodeThread
GetModuleHandleA
DeleteFileW
DuplicateHandle
CloseHandle
MultiByteToWideChar
CreateFileA
SetFilePointer
WaitNamedPipeW
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteFileEx
WinExec
IsDebuggerPresent
DeviceIoControl
LoadLibraryA
VirtualAllocEx
ReadFileEx
GetProcAddress
OpenMutexW
CreateFileW
ReadFile
ReplaceFileW
TerminateProcess
ReadProcessMemory
Sleep
LoadLibraryW
WriteFile
CreateRemoteThread
CopyFileExW
CreateMutexW
CreateToolhelp32Snapshot
ExitProcess
WriteConsoleW
SetStdHandle
RtlUnwind
GetModuleFileNameW
GetTickCount
VirtualProtect
OutputDebugStringA
HeapFree
GetCurrentThreadId
DecodePointer
GetCommandLineA
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
IsProcessorFeaturePresent
HeapAlloc
HeapCreate
HeapDestroy
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
user32
FindWindowW
SetWindowsHookExA
ExitWindowsEx
FindWindowA
SetWindowsHookExW
advapi32
RegEnumKeyExW
ControlService
RegOpenKeyExW
RegEnumValueW
OpenSCManagerA
StartServiceW
RegOpenKeyExA
RegCreateKeyExA
StartServiceA
RegDeleteKeyW
RegDeleteKeyA
RegQueryValueExW
CreateServiceA
RegCreateKeyExW
RegSetValueExA
OpenServiceW
OpenSCManagerW
DeleteService
OpenServiceA
CreateServiceW
RegSetValueExW
shell32
ShellExecuteExW
ShellExecuteExA
ws2_32
ntohl
wininet
InternetOpenUrlW
urlmon
URLDownloadToFileW
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE