ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
8c675b2e94fb2b778f23933f6f3fff5d2145df43ccabe8ff716decd2e3942dba.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c675b2e94fb2b778f23933f6f3fff5d2145df43ccabe8ff716decd2e3942dba.dll
Resource
win10v2004-20220901-en
General
-
Target
8c675b2e94fb2b778f23933f6f3fff5d2145df43ccabe8ff716decd2e3942dba
-
Size
78KB
-
MD5
992d1cf894b95d98ec336446c525de19
-
SHA1
341debda795a4324c4bd1e933e4669c7f57756af
-
SHA256
8c675b2e94fb2b778f23933f6f3fff5d2145df43ccabe8ff716decd2e3942dba
-
SHA512
6f2415932d2ad5d9d61f6f942fda8513f6d36d5cc883d10868f9d7890fd3c830cf46bd206578180d0529da45e29045a24fb2096b350767ba7e44397f80a74dca
-
SSDEEP
1536:tykSDwpjP7N0/fAFl1gcTlGPs/3cj9KfGk0jmtpYa/7MZ6m+DbCl:o/uN0QFOsvs9MGk0OpYa/7MZ6mkbCl
Malware Config
Signatures
Files
-
8c675b2e94fb2b778f23933f6f3fff5d2145df43ccabe8ff716decd2e3942dba.dll windows x86
077af1978953679c295edd467d50213c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
CreateProcessA
MapViewOfFile
CreateFileMappingA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MoveFileExA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
TerminateProcess
WaitForMultipleObjects
LocalSize
OpenProcess
CreateToolhelp32Snapshot
lstrcmpiA
Process32First
GetCurrentThreadId
TerminateThread
SetLastError
MoveFileA
GetModuleFileNameA
ReadFile
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetProcAddress
FreeLibrary
lstrcatA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LoadLibraryA
GetVersionExA
lstrlenA
FreeConsole
GetTickCount
SetUnhandledExceptionFilter
CreateMutexA
OutputDebugStringA
SetErrorMode
OpenEventA
ReleaseMutex
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
GlobalSize
user32
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
OpenDesktopA
PostMessageA
GetKeyNameTextA
UnhookWindowsHookEx
BlockInput
LoadCursorA
SendMessageA
SystemParametersInfoA
DestroyCursor
MapVirtualKeyA
SetCapture
WindowFromPoint
OpenWindowStationA
CloseClipboard
CreateWindowExA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
ExitWindowsEx
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
SetProcessWindowStation
CharNextA
GetWindowTextA
wsprintfA
CloseWindow
GetActiveWindow
SetClipboardData
GetProcessWindowStation
IsWindow
SetCursorPos
GetCursorInfo
gdi32
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
GetDIBits
CreateCompatibleBitmap
BitBlt
SelectObject
advapi32
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegCreateKeyExA
shell32
SHGetFileInfoA
ws2_32
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
getsockname
gethostname
send
select
recv
ntohs
closesocket
socket
gethostbyname
htons
msvcrt
__CxxFrameHandler
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_access
strcat
strcpy
strcmp
strrchr
_except_handler3
free
strchr
atoi
realloc
strncpy
wcstombs
malloc
_CxxThrowException
memcmp
??2@YAPAXI@Z
memset
_strcmpi
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrame
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ