Install
Static task
static1
Behavioral task
behavioral1
Sample
f4d03071632873e9d5d8341cf00b2719b9628414d5cac11af52cb170e8457cfc.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4d03071632873e9d5d8341cf00b2719b9628414d5cac11af52cb170e8457cfc.dll
Resource
win10v2004-20221111-en
General
-
Target
f4d03071632873e9d5d8341cf00b2719b9628414d5cac11af52cb170e8457cfc
-
Size
40KB
-
MD5
36535dc17d4056d26939c610961fa0b0
-
SHA1
47d12e79ec42d523e8e01e3d674fb4744c660065
-
SHA256
f4d03071632873e9d5d8341cf00b2719b9628414d5cac11af52cb170e8457cfc
-
SHA512
05027c6d4470112b978448bc76312eedfd03347ce1603a165980d17dadf6ac5254d3ca117bbb7a0844035df1565a9b8c8a7cd23908fefeef065e44718b32ba84
-
SSDEEP
768:w1rZUsMl2iz3EdxQGFSxGkCiiTDREgiFiOdub+DW2ar/HI32dIHK+:wHMkiz3EdxVFwGDiiT9V8iOo+qHrNdud
Malware Config
Signatures
Files
-
f4d03071632873e9d5d8341cf00b2719b9628414d5cac11af52cb170e8457cfc.dll windows x86
9fefd573864e81c6c9306f29ecf5feaf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
LocalFree
GetLastError
GetVersionExA
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
SearchPathA
GetTempPathA
GetTickCount
GetCurrentProcessId
lstrcpyA
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
WriteProcessMemory
VirtualAllocEx
CreateRemoteThread
DuplicateHandle
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
VirtualProtectEx
CreateMutexA
CreateThread
IsBadReadPtr
ReleaseMutex
GetModuleFileNameA
lstrcmpiA
CloseHandle
GlobalAlloc
GlobalReAlloc
lstrlenA
GetModuleHandleA
GetSystemDirectoryA
DeleteFileA
GetFileAttributesA
CreateFileA
WriteFile
ReadFile
TerminateProcess
Sleep
FreeLibrary
OpenProcess
GlobalFree
user32
GetForegroundWindow
ReleaseDC
GetDC
wsprintfA
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
gdi32
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetStockObject
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateDCA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
SetSecurityInfo
SetEntriesInAclA
GetTokenInformation
OpenProcessToken
msvcrt
_strlwr
_strupr
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
fclose
fwrite
fopen
free
memset
memcpy
malloc
strtok
strlen
strcpy
strrchr
strstr
strncpy
fread
rewind
ftell
fseek
sprintf
printf
ws2_32
htons
socket
WSACleanup
WSAStartup
gethostbyname
connect
closesocket
send
recv
msvcp60
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wininet
HttpSendRequestA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
Exports
Exports
Sections
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ