Static task
static1
Behavioral task
behavioral1
Sample
a27ed230b1dcbb968a81730857f1fa767f9bc5e5901263bfe474576934e83c1d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a27ed230b1dcbb968a81730857f1fa767f9bc5e5901263bfe474576934e83c1d.dll
Resource
win10v2004-20220812-en
General
-
Target
a27ed230b1dcbb968a81730857f1fa767f9bc5e5901263bfe474576934e83c1d
-
Size
29KB
-
MD5
49b8dfbd50d00d8da485aa8a58c52bd6
-
SHA1
4237d90bc27117282c38abc9b62b19933bfd2085
-
SHA256
a27ed230b1dcbb968a81730857f1fa767f9bc5e5901263bfe474576934e83c1d
-
SHA512
b35b13d7f6dd7dd10f0e4080d0a590cb22eeb1cc25c38234766b797d68ba7c4213ba73655c60f2848de62663ff5453de68a13918fe70aea3890e5071fdc18a7d
-
SSDEEP
768:IPij0f/KLexdjlna1OEXqeIt1KZfBBQARQkvRVw8hr:fjdLyJhbEQ3KhBBQARc89
Malware Config
Signatures
Files
-
a27ed230b1dcbb968a81730857f1fa767f9bc5e5901263bfe474576934e83c1d.dll windows x86
5abdcef7ebba0e5689b29722e7524d3f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
gethostname
closesocket
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcmpA
TerminateThread
Sleep
IsBadReadPtr
CreateThread
lstrlenA
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
lstrcpynA
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
VirtualProtectEx
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ