_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
854eceace14fbe5520f0fee49e9f9b990e70538883e1208c3e945768a024eeaf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
854eceace14fbe5520f0fee49e9f9b990e70538883e1208c3e945768a024eeaf.dll
Resource
win10v2004-20221111-en
General
-
Target
854eceace14fbe5520f0fee49e9f9b990e70538883e1208c3e945768a024eeaf
-
Size
19KB
-
MD5
e66bc01d1d90b22179825588c763c93c
-
SHA1
b92ea3e40812da3cd06007875d89cea24913d152
-
SHA256
854eceace14fbe5520f0fee49e9f9b990e70538883e1208c3e945768a024eeaf
-
SHA512
9d0819e7a2fde3e58df2960147fd26e795402c0f8c63359029f5f5b6e6c258497f3732a2811f9b293b28239f15368524d20b9c89d7ba3bce302a29c153ee1bf4
-
SSDEEP
384:zXr1CzlVldmwfBxqLGkniWbeEySrmiz9+vUG:TrMzbi0xCnnXbeLSqiUvU
Malware Config
Signatures
Files
-
854eceace14fbe5520f0fee49e9f9b990e70538883e1208c3e945768a024eeaf.dll windows x86
03fabcf86881fab2b0c9acb7082ec254
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
SetEvent
WaitForSingleObject
CreateEventA
CreateMutexA
CreateThread
LoadLibraryA
GetModuleFileNameA
DisableThreadLibraryCalls
VirtualFree
VirtualProtect
VirtualAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
Module32First
VirtualQuery
GetSystemInfo
GetCurrentProcess
WinExec
WriteFile
CreateFileA
GetTempFileNameA
GetShortPathNameA
GetTempPathA
InterlockedPopEntrySList
InterlockedPushEntrySList
InitializeSListHead
FreeLibrary
ResetEvent
ReleaseMutex
CloseHandle
GetCurrentThread
SetThreadPriority
FreeLibraryAndExitThread
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
Module32Next
user32
SetWindowsHookExA
UnhookWindowsHookEx
ShowWindow
UpdateWindow
CreateWindowExA
RegisterClassA
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
advapi32
RegDeleteKeyA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
DeleteUrlCacheEntry
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
msvcrt
_snprintf
_mbsupr
_mbsstr
strcpy
memcmp
abs
_ismbcprint
__CxxFrameHandler
_memicmp
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_mbsnbcpy
strcat
_ismbcspace
_mbsinc
memmove
strlen
memset
_mbsicmp
memcpy
??2@YAPAXI@Z
_except_handler3
_local_unwind2
_mbsrchr
sprintf
Exports
Exports
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ