rsdapi
Static task
static1
Behavioral task
behavioral1
Sample
4f64a2f0b3f8499aa67455a0f734eb28137ad0a7125c2dd93dc821eff0f6c04b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4f64a2f0b3f8499aa67455a0f734eb28137ad0a7125c2dd93dc821eff0f6c04b.dll
Resource
win10v2004-20221111-en
General
-
Target
4f64a2f0b3f8499aa67455a0f734eb28137ad0a7125c2dd93dc821eff0f6c04b
-
Size
28KB
-
MD5
b3693fd497f8754f666012e615bb9090
-
SHA1
803a2910a65d5a8d8c907cb6d769d3b88bb960fb
-
SHA256
4f64a2f0b3f8499aa67455a0f734eb28137ad0a7125c2dd93dc821eff0f6c04b
-
SHA512
b7531e1564383e079e4a75d41c0401cb117758027f22208a42c558ec4a4fc36a13b185a876663e17098ac102449fa86789ef24811407a269a76b7d00140496db
-
SSDEEP
768:K+T84oxUf/5jzDxXiJJG428ueoyJTjT83/Z:Kr4Jzc/B28X1N8h
Malware Config
Signatures
Files
-
4f64a2f0b3f8499aa67455a0f734eb28137ad0a7125c2dd93dc821eff0f6c04b.dll windows x86
2f677e28743aadb4a50b3129dd0a9fd1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextA
GetForegroundWindow
GetDlgItemTextA
GetClassNameA
EnumChildWindows
CharLowerA
wsprintfA
kernel32
ConnectNamedPipe
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
CloseHandle
GetTempPathA
GetTickCount
HeapFree
IsBadCodePtr
LoadLibraryA
LockFile
MapViewOfFile
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
ord5
WideCharToMultiByte
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetSystemDirectoryA
WaitForSingleObject
ConnectNamedPipe
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
CloseHandle
GetTempPathA
GetTickCount
HeapFree
IsBadCodePtr
LoadLibraryA
LockFile
MapViewOfFile
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
ord5
WideCharToMultiByte
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetSystemDirectoryA
WaitForSingleObject
shell32
ShellExecuteA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
wininet
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
ws2_32
WSACleanup
accept
bind
closesocket
connect
gethostbyname
htons
inet_addr
listen
recv
send
shutdown
socket
WSAStartup
ole32
CoTaskMemFree
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ