Static task
static1
Behavioral task
behavioral1
Sample
4aac51514f2d0217c32625cb3b056eab4d8be73bde23b4bf5612a78eff37c3f5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4aac51514f2d0217c32625cb3b056eab4d8be73bde23b4bf5612a78eff37c3f5.dll
Resource
win10v2004-20220812-en
General
-
Target
4aac51514f2d0217c32625cb3b056eab4d8be73bde23b4bf5612a78eff37c3f5
-
Size
172KB
-
MD5
2340289e3e4d7e61d671c5f856ec5270
-
SHA1
f5dd5dbf9f52f99e09fff33d18e34081c4cc9cac
-
SHA256
4aac51514f2d0217c32625cb3b056eab4d8be73bde23b4bf5612a78eff37c3f5
-
SHA512
2e91f9fb96a3334f0451432d86da2e98334469569abfba8e4e17a92fb3cd95966580a5c5c528827b2ee1b3f96620421de7f81fadffa7a27a70cfdfd1ba85f521
-
SSDEEP
1536:Vl6IRYIDILkuvfZ/AuwZQx/CZX+oPhXbJC2/LRwg7AGYEgRPdEuQvhSUWeuA2E+d:Vl6d44xvfGZQCThrJrXtvkvJAqrljMC
Malware Config
Signatures
Files
-
4aac51514f2d0217c32625cb3b056eab4d8be73bde23b4bf5612a78eff37c3f5.dll windows x86
43fd756e5dbdcd73e36a9ef75656b494
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
Sleep
WideCharToMultiByte
GlobalUnlock
DeleteFileA
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GetWindowsDirectoryA
Process32Next
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
OpenProcess
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GlobalAlloc
GetLastError
SetErrorMode
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
SetUnhandledExceptionFilter
IsBadWritePtr
SetEnvironmentVariableA
HeapReAlloc
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
HeapAlloc
HeapFree
GetVersion
GetSystemTime
GetTimeZoneInformation
RtlUnwind
GlobalLock
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
ExitProcess
IsBadReadPtr
user32
wsprintfA
UnhookWindowsHookEx
GetWindowThreadProcessId
PostMessageA
GetWindowTextA
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
SetWindowsHookExA
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetOpenW
InternetOpenUrlW
ws2_32
inet_ntoa
getpeername
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
OpenProcessToken
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vdata Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ