Static task
static1
Behavioral task
behavioral1
Sample
4419a8b5615b76c37803db30d888dc5970b5e9c7804f782b0e89abb48636ca84.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4419a8b5615b76c37803db30d888dc5970b5e9c7804f782b0e89abb48636ca84.dll
Resource
win10v2004-20220812-en
General
-
Target
4419a8b5615b76c37803db30d888dc5970b5e9c7804f782b0e89abb48636ca84
-
Size
933KB
-
MD5
e200b2564a416bb9e70a46cd7a6ab643
-
SHA1
91a30fa23435f933b9a6f6a34bae4f7a7f104b59
-
SHA256
4419a8b5615b76c37803db30d888dc5970b5e9c7804f782b0e89abb48636ca84
-
SHA512
6f890687f11ead45f1de58a5c01d48027eabd814a769d0caf73b835296afda89cfb767a797ca0034c4219aa7d86e9ba7a47542c354d1490fef45890c294b1b47
-
SSDEEP
12288:UCYNICoOW7SOsDVt1AqOj8wmViPHI6U05NcP/GMeIaQB7OJEtlyeGo:J8A7ZsDVvw8wHIyr6miB7OJveGo
Malware Config
Signatures
Files
-
4419a8b5615b76c37803db30d888dc5970b5e9c7804f782b0e89abb48636ca84.dll windows x86
c72905eba19d43b178b176d7fa0bfb4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
CreateFileA
GetPrivateProfileStringA
GetCurrentProcessId
GetTickCount
SetFilePointer
HeapAlloc
GetProcessHeap
VirtualProtect
Process32Next
Process32First
ReadFile
Module32Next
Module32First
OpenProcess
GetLastError
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
LoadLibraryA
GetCommandLineA
IsBadReadPtr
SetEvent
CloseHandle
GetModuleFileNameA
Sleep
GetCurrentProcess
TerminateProcess
OpenEventA
CreateEventA
CreateToolhelp32Snapshot
CreateThread
user32
BroadcastSystemMessageA
SetWindowsHookExA
CallNextHookEx
ToAscii
GetKeyboardState
MapVirtualKeyA
GetWindowThreadProcessId
FindWindowA
IsWindowVisible
GetWindowTextA
GetWindowLongA
wsprintfA
wvsprintfA
FindWindowExA
advapi32
RegQueryValueExA
RegSetValueA
RegCreateKeyA
RegOpenKeyA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
msvcrt
memset
_strcmpi
_adjust_fdiv
_initterm
_strlwr
realloc
_except_handler3
memcpy
sprintf
strcpy
strcat
strlen
strcmp
strncpy
free
strchr
strstr
malloc
strrchr
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ