Static task
static1
Behavioral task
behavioral1
Sample
911822d8c272bfbfcdd0a119b27abd0f48dedc9eccd28bb01ff4daef53e7b41a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
911822d8c272bfbfcdd0a119b27abd0f48dedc9eccd28bb01ff4daef53e7b41a.dll
Resource
win10v2004-20220812-en
General
-
Target
911822d8c272bfbfcdd0a119b27abd0f48dedc9eccd28bb01ff4daef53e7b41a
-
Size
294KB
-
MD5
60b02f6920f28e3bb11bb0f06319b177
-
SHA1
c5c8a8a1ed40cd7101827449132410815e293ac5
-
SHA256
911822d8c272bfbfcdd0a119b27abd0f48dedc9eccd28bb01ff4daef53e7b41a
-
SHA512
bdc1d2d740ada911c4e1955179e1f10442ce2febb5709532c572b92bd292068bd1cc53d7a918f09d887d433fe5d9beb9e43bf9c070f758891e1cf9be99a507b1
-
SSDEEP
6144:NuJ222CrpjxUmElix7p1ZDooGnauRRlsaL2rqZ:4J2dmElI3ZDoDnBx
Malware Config
Signatures
Files
-
911822d8c272bfbfcdd0a119b27abd0f48dedc9eccd28bb01ff4daef53e7b41a.dll windows x86
b72754bdf54eb0aa836c275210fdbdd5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OpenInputDesktop
GetThreadDesktop
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
SetThreadDesktop
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
ExitWindowsEx
wsprintfA
CallNextHookEx
RegisterDeviceNotificationA
OpenWindowStationA
SetProcessWindowStation
DestroyWindow
CloseDesktop
CloseWindowStation
TranslateMessage
DispatchMessageA
CreateWindowExA
PostThreadMessageA
LoadIconA
LoadCursorA
GetSystemMetrics
LoadImageA
RegisterClassExA
ShowWindow
BringWindowToTop
UpdateWindow
EnumWindows
CharUpperA
CharLowerA
GetActiveWindow
GetMessageA
gdi32
CreateDCA
GetDIBits
CreateCompatibleBitmap
DeleteObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateCompatibleDC
SelectObject
BitBlt
advapi32
RegOpenKeyExA
AdjustTokenPrivileges
OpenThreadToken
ImpersonateSelf
RegisterServiceCtrlHandlerA
SetServiceStatus
LogonUserA
CreateProcessAsUserA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ControlService
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceA
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
GetUserNameW
shell32
StrChrA
StrStrA
SHEmptyRecycleBinA
StrRChrA
ShellExecuteA
StrCmpNIA
SHFileOperationA
ole32
CreateStreamOnHGlobal
ws2_32
WSAStartup
select
recv
setsockopt
closesocket
connect
socket
htons
inet_ntoa
gethostbyname
inet_addr
send
shlwapi
StrCmpW
StrToIntA
SHDeleteKeyA
psapi
GetModuleFileNameExA
imm32
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmReleaseContext
ImmGetContext
msvcrt
rand
srand
time
__dllonexit
_onexit
_initterm
_adjust_fdiv
getenv
strrchr
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
kernel32
GetFileSize
OpenMutexA
OpenEventA
lstrcatW
lstrlenW
FlushFileBuffers
SetFilePointer
WideCharToMultiByte
GetModuleFileNameA
OpenProcess
GetFileAttributesExA
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
GetLogicalDriveStringsA
lstrcmpiA
GetCurrentProcessId
TerminateProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
CopyFileA
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetLocalTime
GetOEMCP
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
lstrlenA
GetTempPathA
GetCurrentThreadId
CreateFileA
WriteFile
CloseHandle
RaiseException
LoadLibraryA
GlobalAlloc
GetCurrentThread
GetSystemDirectoryA
DeleteFileA
SetEvent
GetStartupInfoA
lstrcatA
CreateProcessA
lstrcpyA
WaitForSingleObject
Sleep
GetTickCount
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 509B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE