Static task
static1
Behavioral task
behavioral1
Sample
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll
Resource
win10v2004-20220812-en
General
-
Target
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c
-
Size
27KB
-
MD5
13b19c443e6994ffdf287e3a6b591370
-
SHA1
cacad7c09953913152af3ded4dad2d42075c8b8a
-
SHA256
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c
-
SHA512
db916b6a3cac5fdd87fb6fc2c48c233ca3941610d5ac2a6bdc9610e625463e730ed3cf938a4acc31d2dfc1da86b57c34f8eedfd6ba7f235ececdcee2148f944f
-
SSDEEP
384:1/yASy0m2N4tlJQNPi20Q/IdPc8zuPWSXabDOJBpbmXwkIvuwHjCYe:S0lJwPi5Q/IVZu+kVmf2e
Malware Config
Signatures
Files
-
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll windows x86
f70edadfcb080d96dd06f9e9b1542b6f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwSetInformationFile
ZwOpenProcessToken
ZwQueryInformationToken
memcpy
ZwWriteFile
RtlIpv4StringToAddressW
RtlIpv4AddressToStringA
RtlNtStatusToDosError
ZwCreateFile
RtlAdjustPrivilege
RtlFreeUnicodeString
wcschr
ZwQueryInformationFile
ZwOpenFile
RtlDosPathNameToNtPathName_U
LdrFindEntryForAddress
ZwLoadDriver
wcslen
ZwSetValueKey
RtlInitUnicodeString
ZwCreateKey
swprintf
ZwClose
ZwDeleteKey
RtlPrefixUnicodeString
RtlGetCurrentPeb
strchr
memcmp
sprintf
strcpy
strcmp
strlen
qsort
RtlComputeCrc32
memset
RtlCreateUserThread
LdrAddRefDll
ZwReadFile
ZwDeleteFile
ZwEnumerateKey
ZwOpenKey
ZwQueryValueKey
RtlImageNtHeader
kernel32
CreateProcessW
LocalFree
VirtualAlloc
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetSystemTimeAsFileTime
GetLastError
BindIoCompletionCallback
LocalAlloc
FreeLibraryAndExitThread
GetVersion
ExitThread
Sleep
VirtualFree
GetTickCount
ws2_32
WSASendTo
setsockopt
WSASend
WSARecv
WSAIoctl
bind
closesocket
WSAGetLastError
WSASocketW
WSACleanup
WSAStartup
WSARecvFrom
shell32
ShellExecuteExW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 742B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ