Static task
static1
Behavioral task
behavioral1
Sample
98a9a01f1afcb1b9585b49ac1cb33dc5e3d0f35a90d12f003b15a53882f3086a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98a9a01f1afcb1b9585b49ac1cb33dc5e3d0f35a90d12f003b15a53882f3086a.dll
Resource
win10v2004-20220812-en
General
-
Target
98a9a01f1afcb1b9585b49ac1cb33dc5e3d0f35a90d12f003b15a53882f3086a
-
Size
170KB
-
MD5
3934e8fbb00b70d0759f027250b0dcf8
-
SHA1
4e8abe89fc65caa61271e5884989b10fa037de06
-
SHA256
98a9a01f1afcb1b9585b49ac1cb33dc5e3d0f35a90d12f003b15a53882f3086a
-
SHA512
9051d3cc3ac0650c4ad8c30a8eaca30d1de2e0028617067e60381b1c96f5f9798625c0d1a8659fbb4c590b3eee0595512519ef8462af441cba91d0e2ef01f38b
-
SSDEEP
3072:7kcmxvfGsA29xTIGEADTQcQd47kPnRVEal8k1:7kc0f82DcPAD4dCkPRi
Malware Config
Signatures
Files
-
98a9a01f1afcb1b9585b49ac1cb33dc5e3d0f35a90d12f003b15a53882f3086a.dll windows x86
c7e0cb64f0dba26c316cea63ef1a2ecd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
DeleteFileA
Sleep
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
TerminateProcess
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GetWindowsDirectoryA
Process32Next
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
OpenProcess
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
ExitProcess
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GetProcAddress
ResumeThread
GetCurrentThread
GetLastError
SetErrorMode
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
SetUnhandledExceptionFilter
SetFilePointer
SetEnvironmentVariableA
IsBadWritePtr
HeapReAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
HeapAlloc
HeapFree
GetVersion
GetSystemTime
GetTimeZoneInformation
RtlUnwind
GlobalUnlock
WideCharToMultiByte
GetComputerNameA
GlobalAlloc
GlobalLock
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
IsBadReadPtr
user32
GetWindowThreadProcessId
wsprintfA
UnhookWindowsHookEx
PostMessageA
GetWindowTextA
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetOpenUrlW
InternetOpenW
ws2_32
inet_ntoa
getpeername
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
RegEnumValueA
LookupPrivilegeValueA
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vdata Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ