WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
d667667639859e138c677bbea1091b84ce3dbd7460714fb4fdfa3888052c79c4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d667667639859e138c677bbea1091b84ce3dbd7460714fb4fdfa3888052c79c4.dll
Resource
win10v2004-20220812-en
General
-
Target
d667667639859e138c677bbea1091b84ce3dbd7460714fb4fdfa3888052c79c4
-
Size
296KB
-
MD5
82f5bbd25605e5fb22d58aa99f8c79ec
-
SHA1
33975d688ad87e29b5230554ed2ac11752b5659f
-
SHA256
d667667639859e138c677bbea1091b84ce3dbd7460714fb4fdfa3888052c79c4
-
SHA512
f96e6a61411cda95067239b8430d2b39b65ffee2a1946e48c41c4338e7df1854e53557e0abb1b8713ac7ad84479af8455d205bf5bc0ddc5fb089afde8de25c05
-
SSDEEP
6144:8Qni6dQh0+epUQQja+Atg9CRqhTBju/V9:X9mQ/g9CRqhTkv
Malware Config
Signatures
Files
-
d667667639859e138c677bbea1091b84ce3dbd7460714fb4fdfa3888052c79c4.dll windows x86
e01706db95ca9cc1df11b42512aed4ba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
Netbios
kernel32
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RaiseException
RtlUnwind
ExitProcess
HeapSize
SetEndOfFile
GetFileType
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
SetEnvironmentVariableA
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
MoveFileA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleA
SetLastError
GetCurrentThreadId
lstrlenA
InterlockedExchange
CompareStringW
GetVersion
CompareStringA
WideCharToMultiByte
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
CloseHandle
CreateProcessA
CreateThread
GetModuleFileNameA
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
WritePrivateProfileStringA
ExpandEnvironmentStringsA
GetPrivateProfileIntA
Process32Next
GetLastError
GetVersionExA
Process32First
CreateToolhelp32Snapshot
DeleteFileA
Sleep
CreateDirectoryA
GetCurrentProcessId
GetTickCount
SetStdHandle
user32
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetForegroundWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
PostQuitMessage
CharUpperA
FindWindowA
PostMessageA
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetDlgItem
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyA
QueryServiceStatus
CloseServiceHandle
GetUserNameA
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
shlwapi
PathFindExtensionA
UrlUnescapeA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
ws2_32
gethostbyname
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ