Static task
static1
Behavioral task
behavioral1
Sample
c17dc864a4db612dd67f22d08bc9f5fdd85266bf1c64f3a287bd2b37c42132b1.dll
Resource
win7-20220812-en
General
-
Target
c17dc864a4db612dd67f22d08bc9f5fdd85266bf1c64f3a287bd2b37c42132b1
-
Size
549KB
-
MD5
133a40094212c3235e4883a0c75e31d0
-
SHA1
44f68a916de8be0f82a441b8b217bb4dc3217211
-
SHA256
c17dc864a4db612dd67f22d08bc9f5fdd85266bf1c64f3a287bd2b37c42132b1
-
SHA512
4b3e6d0bb838211a265e40e87dc4c748de842f9039f3ea6251a09b2dfda8d38c829c6ead96660d80d3f5e019ae479dc01c4ac62add15f29be405b24824b92858
-
SSDEEP
12288:ZU866w0B2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvm0aL7+F:ZSGB2uJ2s4otqFCJrW9FqvSbqsHasgXE
Malware Config
Signatures
Files
-
c17dc864a4db612dd67f22d08bc9f5fdd85266bf1c64f3a287bd2b37c42132b1.dll windows x86
cd3ac686465b05b369ab87d0724dcd62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
MoveFileWithProgressW
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetSystemTime
GetCurrentProcess
Process32First
WaitForSingleObject
GetLastError
Process32Next
GetExitCodeThread
GetModuleHandleA
DeleteFileW
DuplicateHandle
CloseHandle
MultiByteToWideChar
CreateFileA
SetFilePointer
WaitNamedPipeW
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteFileEx
WinExec
IsDebuggerPresent
DeviceIoControl
LoadLibraryA
VirtualAllocEx
ReadFileEx
GetProcAddress
OpenMutexW
CreateFileW
ReadFile
ReplaceFileW
TerminateProcess
ReadProcessMemory
Sleep
LoadLibraryW
WriteFile
CreateRemoteThread
CopyFileExW
CreateMutexW
CreateToolhelp32Snapshot
ExitProcess
WriteConsoleW
SetStdHandle
RtlUnwind
GetModuleFileNameW
GetTickCount
VirtualProtect
OutputDebugStringA
HeapFree
GetCurrentThreadId
DecodePointer
GetCommandLineA
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
IsProcessorFeaturePresent
HeapAlloc
HeapCreate
HeapDestroy
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
user32
FindWindowW
SetWindowsHookExA
ExitWindowsEx
FindWindowA
SetWindowsHookExW
advapi32
RegEnumKeyExW
ControlService
RegOpenKeyExW
RegEnumValueW
OpenSCManagerA
StartServiceW
RegOpenKeyExA
RegCreateKeyExA
StartServiceA
RegDeleteKeyW
RegDeleteKeyA
RegQueryValueExW
CreateServiceA
RegCreateKeyExW
RegSetValueExA
OpenServiceW
OpenSCManagerW
DeleteService
OpenServiceA
CreateServiceW
RegSetValueExW
shell32
ShellExecuteExW
ShellExecuteExA
ws2_32
ntohl
wininet
InternetOpenUrlW
urlmon
URLDownloadToFileW
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 357KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE