ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
70b0cadc867e4905cee0ee76b9fc2cbb1ddae48bfee59f0ddb0c6c5f43c67bfa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70b0cadc867e4905cee0ee76b9fc2cbb1ddae48bfee59f0ddb0c6c5f43c67bfa.dll
Resource
win10v2004-20220812-en
General
-
Target
70b0cadc867e4905cee0ee76b9fc2cbb1ddae48bfee59f0ddb0c6c5f43c67bfa
-
Size
168KB
-
MD5
583410233892a582faf305325ea2521b
-
SHA1
1ba69f897f910fe9db494b0b05d7c0f6d5ff6a9f
-
SHA256
70b0cadc867e4905cee0ee76b9fc2cbb1ddae48bfee59f0ddb0c6c5f43c67bfa
-
SHA512
bd677f1a4591e813804f14049af4aa5ee5cbd2c3bc6828f992487fb777a587a6093d347347c6086785fb82db634ae37ce9475980188b7885a80f6eb47b8d091e
-
SSDEEP
3072:FVFzV2RqdUiRcUv1E5/r2IzWXsjIOf59fXQ1I5GRW+ji:F4WH64vuTfkvri
Malware Config
Signatures
Files
-
70b0cadc867e4905cee0ee76b9fc2cbb1ddae48bfee59f0ddb0c6c5f43c67bfa.dll windows x86
cb9306991f88cc29462810ba76a3497b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
DeleteFileA
WideCharToMultiByte
GetFileSize
SetEndOfFile
SetFilePointer
WriteFile
GetExitCodeProcess
TerminateProcess
GlobalAlloc
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
CopyFileA
MoveFileExA
MoveFileA
CreateDirectoryA
RemoveDirectoryA
ReadFile
GetVolumeInformationA
LoadLibraryA
GetProcAddress
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryA
FreeLibrary
SystemTimeToFileTime
GetTempFileNameA
SizeofResource
LockResource
GetLastError
FindResourceA
FindResourceExA
GetLogicalDrives
GetDriveTypeA
GetModuleFileNameA
MultiByteToWideChar
CreateEventA
GetLocalTime
WaitForSingleObject
CreateThread
Sleep
CloseHandle
SetFileTime
GetFileTime
CreateFileA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetModuleHandleA
GetConsoleMode
GetConsoleCP
RtlUnwind
VirtualAlloc
LoadResource
GetSystemDirectoryA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCommandLineA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
advapi32
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFileExistsA
StrStrIA
PathIsDirectoryA
ws2_32
WSACleanup
WSAStartup
recv
send
setsockopt
__WSAFDIsSet
shutdown
select
connect
inet_addr
htons
ioctlsocket
closesocket
WSAGetLastError
socket
gethostname
inet_ntoa
getsockopt
gethostbyname
rpcrt4
UuidFromStringA
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ