fuckyou
Static task
static1
Behavioral task
behavioral1
Sample
27f30abdd0f2ae31b801c08ca49820685b46ac51d8d78744faf5f64ff3395e56.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27f30abdd0f2ae31b801c08ca49820685b46ac51d8d78744faf5f64ff3395e56.dll
Resource
win10v2004-20220812-en
General
-
Target
27f30abdd0f2ae31b801c08ca49820685b46ac51d8d78744faf5f64ff3395e56
-
Size
106KB
-
MD5
837006c97a4c059d7e002f64cc840c90
-
SHA1
8797a9a4dce3921e27fb24d1d99413c804350374
-
SHA256
27f30abdd0f2ae31b801c08ca49820685b46ac51d8d78744faf5f64ff3395e56
-
SHA512
9f71dc3e6043f8fba141e42f273109203ac7eb5b56bea30dfa27c77eac77b3c15b0d357f1d4b9d06dc7cc59b53bc858acbe064a8244baa5ca04268871d1bb8e7
-
SSDEEP
3072:JjIUx9VkylOAiRWLndo5T9aqQRdsa1sxdhZGTwzNlR:5HxpOAiRWBoNrQzB1uZswzN
Malware Config
Signatures
Files
-
27f30abdd0f2ae31b801c08ca49820685b46ac51d8d78744faf5f64ff3395e56.dll windows x86
40191f7098d85cbc0efe9c6c68830b31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
WriteFile
DeviceIoControl
CreateFileA
lstrcmpiA
Process32First
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GetCurrentProcess
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
Process32Next
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
ExitProcess
CreateProcessA
MoveFileA
SetFilePointer
ReadFile
GetFileSize
GetProcAddress
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
GlobalAlloc
user32
LoadIconA
RegisterClassA
CreateWindowExA
CloseWindow
IsWindow
SendMessageA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorInfo
DestroyCursor
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
ExitWindowsEx
GetWindowTextA
MessageBoxA
LoadCursorA
LoadMenuA
gdi32
GetStockObject
advapi32
ChangeServiceConfig2A
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegRestoreKeyA
RegSaveKeyA
EnumServicesStatusA
QueryServiceConfigA
ControlService
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
RegOpenKeyA
SetServiceStatus
CreateServiceA
shell32
SHGetSpecialFolderPathA
msvcrt
strlen
strstr
_CxxThrowException
memcmp
rand
strcpy
sprintf
strncpy
free
malloc
_except_handler3
strcmp
strcat
_ftol
strncat
_beginthreadex
atoi
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
ceil
putchar
_strnicmp
memmove
__CxxFrameHandler
strchr
_strrev
_stricmp
memcpy
puts
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
ws2_32
send
inet_addr
connect
sendto
WSASocketA
htonl
getsockname
select
recv
socket
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
WSAStartup
closesocket
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ