sERVICEmAIN
Static task
static1
Behavioral task
behavioral1
Sample
74680161e81a2082369950cbdb7ed52a3a08602c43d6e3a12e7601a8d1c3db0b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74680161e81a2082369950cbdb7ed52a3a08602c43d6e3a12e7601a8d1c3db0b.dll
Resource
win10v2004-20220901-en
General
-
Target
74680161e81a2082369950cbdb7ed52a3a08602c43d6e3a12e7601a8d1c3db0b
-
Size
115KB
-
MD5
3404fcd272fdfc7fb86a0bcadb8f57c0
-
SHA1
75a5c7cb6bc2071a5d9b44a74fd68ad1d6b947f9
-
SHA256
74680161e81a2082369950cbdb7ed52a3a08602c43d6e3a12e7601a8d1c3db0b
-
SHA512
ab82f4a3dc01e80ae64683321563fc9dfe6e40520a1aa5ebeda8db332707144866c4caab15a89e00687c571479be23bc2b07cfc116796d9ad2e37ef049b7b30d
-
SSDEEP
1536:DTbGRZSBBEzzEhXU3LZII2WGfIwlG1CitcVlPffX8e9xiiV:DTbGZlmU3LZwmCitel3fX8fiV
Malware Config
Signatures
Files
-
74680161e81a2082369950cbdb7ed52a3a08602c43d6e3a12e7601a8d1c3db0b.dll windows x86
14cdb57b865bc9d2e2460b5f86cc9fa0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
TerminateThread
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
ExitThread
GetTickCount
MoveFileExA
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
OutputDebugStringA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetTempPathA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
RaiseException
CloseHandle
MoveFileA
CreateEventA
msvcrt
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
strncpy
atoi
strncmp
sprintf
_errno
memcmp
rand
srand
time
strncat
realloc
wcstombs
_beginthreadex
calloc
_initterm
_adjust_fdiv
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
_strnicmp
_strrev
memset
??2@YAPAXI@Z
_strcmpi
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICCompressorFree
ICSeqCompressFrameEnd
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICClose
Exports
Exports
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ