Static task
static1
Behavioral task
behavioral1
Sample
2ff3013c31a831153c3349fc5b4c626d98c7526975f841c8b316de5b22767258.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2ff3013c31a831153c3349fc5b4c626d98c7526975f841c8b316de5b22767258.dll
Resource
win10v2004-20220812-en
General
-
Target
2ff3013c31a831153c3349fc5b4c626d98c7526975f841c8b316de5b22767258
-
Size
99KB
-
MD5
83a0a8db8cd1e2a61709eaaa6c579eb7
-
SHA1
a1be9c36a16aca32d04e21307004b21b33b724d2
-
SHA256
2ff3013c31a831153c3349fc5b4c626d98c7526975f841c8b316de5b22767258
-
SHA512
381bd1e53b07cf2635a7d18e197474e69346abff5971e29e1bf2ece40a59d66b5ffb0163d9f0b522edc2b8da963b72a935d80480d808500adbfc8b2cb22390ea
-
SSDEEP
3072:HNStTBfCingiCsfeqwAKJiVU2+tAJJAWOcuQgA:wtTBisEiejtAJJAWxOA
Malware Config
Signatures
Files
-
2ff3013c31a831153c3349fc5b4c626d98c7526975f841c8b316de5b22767258.dll windows x86
57b32e1ffce3184b1db0d8729021445f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
Process32Next
GetPriorityClass
Module32First
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
CreateThread
TerminateThread
ExitThread
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
CreateEventA
GetModuleHandleA
WriteFile
GetCurrentProcess
GetFileSize
GetTickCount
SetThreadPriority
GetCurrentThread
lstrcpyA
GlobalMemoryStatusEx
GetVersionExA
GetComputerNameA
SizeofResource
FindResourceA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
ReadFile
CreateFileA
user32
SetCursorPos
keybd_event
ExitWindowsEx
LoadStringA
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
mouse_event
GetDesktopWindow
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDIBits
DeleteObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
AdjustTokenPrivileges
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
free
_adjust_fdiv
_initterm
_strcmpi
_onexit
strncat
strncpy
sprintf
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strchr
strstr
rand
srand
time
strncmp
??3@YAXPAX@Z
_ftol
exit
strcspn
malloc
__dllonexit
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?_Xran@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
ws2_32
recv
gethostbyname
inet_addr
WSAStartup
closesocket
connect
send
socket
shutdown
sendto
WSASocketA
htonl
setsockopt
htons
WSAIoctl
winmm
timeGetTime
Sections
.data Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ