Static task
static1
Behavioral task
behavioral1
Sample
d0c26a343445dbe24c382d888b148794dbe35b5ec2a9290f2c92dbd4aba165eb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0c26a343445dbe24c382d888b148794dbe35b5ec2a9290f2c92dbd4aba165eb.dll
Resource
win10v2004-20220901-en
General
-
Target
d0c26a343445dbe24c382d888b148794dbe35b5ec2a9290f2c92dbd4aba165eb
-
Size
64KB
-
MD5
643daca0b86fcb5dbc0a50f62c8c7570
-
SHA1
4ef80f859e65aaa39e71ec5efe0bca5b593177f8
-
SHA256
d0c26a343445dbe24c382d888b148794dbe35b5ec2a9290f2c92dbd4aba165eb
-
SHA512
f9096c23cd7ebb5815f581893fa48b69f6dfa6cc8563658c28088019032b55b5ee20f808379e18531544b8e1ebc25feb5e4c5871c1084486c6327e3838d9cd3c
-
SSDEEP
768:xyBhefqBs/VCaVINp7dRqQA+NIAJueU4gcABBQARQkvueNI9Yse4xort:xyBheSQCcwieU4gvBBQARMw4x0
Malware Config
Signatures
Files
-
d0c26a343445dbe24c382d888b148794dbe35b5ec2a9290f2c92dbd4aba165eb.dll windows x86
b26e4702d78ed86b0e45871d0321c205
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memcmp
memcpy
strlen
strstr
_snprintf
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
kernel32
lstrcmpA
GetLastError
GetFileSize
GetExitCodeThread
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
ReadFile
MoveFileExA
CloseHandle
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpynA
lstrlenA
IsBadReadPtr
DeleteFileA
lstrcpyA
CreateFileMappingA
CreateFileA
GetTempFileNameA
GetTempPathA
MapViewOfFile
GetStartupInfoA
user32
SetTimer
ToAscii
GetKeyboardState
KillTimer
GetWindowThreadProcessId
FindWindowA
wsprintfA
UnhookWindowsHookEx
CallNextHookEx
RegisterWindowMessageA
SendMessageA
MapVirtualKeyA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.luma0 Size: 4KB - Virtual size: 738B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.luma1 Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ