Static task
static1
Behavioral task
behavioral1
Sample
e22f72212ebc6430b46d0c783eef458c520f8c38135140285715ac63fa302e66.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e22f72212ebc6430b46d0c783eef458c520f8c38135140285715ac63fa302e66.dll
Resource
win10v2004-20221111-en
General
-
Target
e22f72212ebc6430b46d0c783eef458c520f8c38135140285715ac63fa302e66
-
Size
25KB
-
MD5
77ff22c00c9aa743e9359774223e1c08
-
SHA1
fdbb22d350b7bcf580acca0309a21e70697f5ae0
-
SHA256
e22f72212ebc6430b46d0c783eef458c520f8c38135140285715ac63fa302e66
-
SHA512
b9193b27f9aabf0c75f92a9c9f9708e930807f2da06bb2e47bb7beb8e743b0ae2f0b80f03c02fcd99ad61896c0ae61cd7129c3f1641d104db78450011a6143f0
-
SSDEEP
384:k5er6/80Sx99ekPVfQVyYb0x52Fv956M8nSn9s3Gg0Dn6aFETlZlwUJx:/+8b9/fQkYbIsrT8nM9s346KETHlL
Malware Config
Signatures
Files
-
e22f72212ebc6430b46d0c783eef458c520f8c38135140285715ac63fa302e66.dll windows x86
301e605d643760e700573de4255adf7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetCurrentProcess
CreateThread
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualAllocEx
CreateProcessA
GetProcAddress
CopyFileA
GetModuleFileNameA
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
LoadLibraryA
IsBadReadPtr
FreeLibrary
lstrcpyA
GetTempPathA
GetVolumeInformationA
FindClose
FindNextFileA
FindFirstFileA
ExitProcess
InterlockedExchangeAdd
DebugActiveProcessStop
ContinueDebugEvent
TerminateProcess
WaitForDebugEvent
DebugActiveProcess
OpenProcess
ExitThread
GetVersionExA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetCommandLineA
InterlockedIncrement
ReadFile
GetFileSize
InterlockedExchange
CreateMutexA
OpenMutexA
MapViewOfFile
GetLastError
CreateFileMappingA
GetSystemInfo
GetComputerNameA
lstrlenA
Sleep
lstrcmpiA
HeapReAlloc
HeapFree
GetProcessHeap
GetTickCount
HeapAlloc
user32
wsprintfA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
??1type_info@@UAE@XZ
memcpy
memset
memcmp
printf
__CxxFrameHandler
strrchr
??3@YAXPAX@Z
ws2_32
inet_addr
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
dbghelp
ImageNtHeader
shlwapi
StrStrIA
StrDupA
psapi
GetProcessImageFileNameA
EnumProcesses
GetProcessMemoryInfo
dnsapi
DnsRecordListFree
DnsQuery_A
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ