ProcessTrans
Static task
static1
Behavioral task
behavioral1
Sample
5300c6b81957a0c0e795ee1c635af629a01a659930f522ffd1843cdc0f55cdbd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5300c6b81957a0c0e795ee1c635af629a01a659930f522ffd1843cdc0f55cdbd.dll
Resource
win10v2004-20220812-en
General
-
Target
5300c6b81957a0c0e795ee1c635af629a01a659930f522ffd1843cdc0f55cdbd
-
Size
72KB
-
MD5
320331138e5d9641f672300c724712c6
-
SHA1
06b32c821acaf147a0329945a5e6541980775ef9
-
SHA256
5300c6b81957a0c0e795ee1c635af629a01a659930f522ffd1843cdc0f55cdbd
-
SHA512
8b756385fab8489c34e479fec559a3a06a03378ae61492b82f603477cccc53fa7dbeb4f4cce5351114e0b463d749f5737bf2b1b4d4f05935b7450d959098b75e
-
SSDEEP
768:8XfA6OKNIwtdIVssEZnWnC7WILWx4hftD7+lkBcIxrcfQowKRGeE:8Xo67iwSu9WCKIA4X76upTORG
Malware Config
Signatures
Files
-
5300c6b81957a0c0e795ee1c635af629a01a659930f522ffd1843cdc0f55cdbd.dll windows x86
262ec234632952318d030491ac10d403
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpEndRequestA
HttpSendRequestExA
InternetReadFile
HttpSendRequestA
InternetCloseHandle
InternetSetOptionA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetWriteFile
shlwapi
SHDeleteKeyA
ws2_32
inet_addr
closesocket
accept
send
recv
listen
connect
htons
socket
bind
setsockopt
mfc42
ord6467
ord815
ord561
ord3738
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord3953
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord1116
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord3178
ord3010
ord3790
ord356
ord2770
ord1980
ord2781
ord4058
ord3181
ord800
ord3319
ord3310
ord2820
ord6385
ord668
ord354
ord5186
ord1979
ord665
ord825
ord823
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord4424
msvcrt
atol
__CxxFrameHandler
strchr
strrchr
_strupr
sprintf
_beginthread
fclose
fseek
fopen
fread
fwrite
free
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
calloc
_stat
malloc
kernel32
lstrlenA
SetCurrentDirectoryA
GetVolumeInformationA
lstrcpyA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcess
Process32Next
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
MoveFileA
CreateDirectoryA
CreateEventA
Sleep
WaitForSingleObject
SetEvent
GetComputerNameA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVersion
ReleaseMutex
DeleteFileA
CreateMutexA
WaitForMultipleObjects
GetSystemDirectoryA
GetCurrentThread
ReadFile
WriteFile
CreateProcessA
GetEnvironmentVariableA
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
LocalAlloc
GetTempPathA
LocalFree
TerminateProcess
user32
SetCursorPos
PeekMessageA
SendMessageA
ExitWindowsEx
keybd_event
mouse_event
DispatchMessageA
IsWindow
GetDC
ReleaseDC
TranslateMessage
wsprintfA
gdi32
GetDeviceCaps
CreateDCA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
advapi32
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
RegEnumValueA
QueryServiceConfigA
ImpersonateSelf
OpenThreadToken
GetUserNameA
AdjustTokenPrivileges
shell32
SHEmptyRecycleBinA
SHFileOperationA
ShellExecuteA
avicap32
capCreateCaptureWindowA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ