Static task
static1
Behavioral task
behavioral1
Sample
c458bcec180b319a528dad187adc1f064a3360885f773d6ee3bb2783662cad83.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c458bcec180b319a528dad187adc1f064a3360885f773d6ee3bb2783662cad83.dll
Resource
win10v2004-20221111-en
General
-
Target
c458bcec180b319a528dad187adc1f064a3360885f773d6ee3bb2783662cad83
-
Size
16KB
-
MD5
36ff095b25dcd256eebaeb8885e4f758
-
SHA1
8fb4aa14fc6782dc7a97f196358c2122e91675b8
-
SHA256
c458bcec180b319a528dad187adc1f064a3360885f773d6ee3bb2783662cad83
-
SHA512
90b14f464a343acfc7f7ae4aaf14143c165645a68451dadb2337ba2dcb7426e87de79322fd19510e29de61b1fd1f4a5d900ca5f7cb0a1f68e83e4dcf901bd80b
-
SSDEEP
192:TpvrJjUVSbnlRbsKquWD0MbsfIIVmE1mAr9rZwEE6uCpVZMSBSn3h5:xJjUef4uWDlQfIIVb1Rr146nVCn3h5
Malware Config
Signatures
Files
-
c458bcec180b319a528dad187adc1f064a3360885f773d6ee3bb2783662cad83.dll windows x86
beb34b89a61475bfc94c0de8a9ea7918
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindClose
FindFirstFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
lstrlenA
OpenProcess
GetWindowsDirectoryA
ReleaseMutex
GetLastError
CreateMutexA
FindNextFileA
Sleep
lstrcpyA
lstrcmpiA
GlobalAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
GetCurrentProcessId
VirtualAlloc
VirtualFree
ReadFile
GetFileSize
CreateFileA
GetCurrentProcess
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CloseHandle
user32
wsprintfA
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupAccountSidA
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueA
msvcrt
memcpy
_strlwr
sprintf
strstr
strcpy
strcat
_except_handler3
memset
Sections
.bss Size: - Virtual size: 576B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ