Static task
static1
Behavioral task
behavioral1
Sample
facdcb03eb222f0ac7cdc205dcc316e4c74b1720c00050165e899f44c3ab225a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
facdcb03eb222f0ac7cdc205dcc316e4c74b1720c00050165e899f44c3ab225a.dll
Resource
win10v2004-20221111-en
General
-
Target
facdcb03eb222f0ac7cdc205dcc316e4c74b1720c00050165e899f44c3ab225a
-
Size
107KB
-
MD5
11c597bf19a42d4c285c062639b1fddb
-
SHA1
c95c7aca7ae9681d2990d2bbc82826001951b205
-
SHA256
facdcb03eb222f0ac7cdc205dcc316e4c74b1720c00050165e899f44c3ab225a
-
SHA512
467b82be6eed228dcacebf5f3fe6e415acb245a5b55eadd6aecc5158a6fc8018ae033a7649e87d0422e13167ca0caa6fe68a990affdb6104c5dc8f9cb309199a
-
SSDEEP
1536:NIzfIbIokuvfZ/AuwAwDzhRA9ROvGcxh1D+j1VElzB:NMEHxvfG3zhO9AvG2ihCj
Malware Config
Signatures
Files
-
facdcb03eb222f0ac7cdc205dcc316e4c74b1720c00050165e899f44c3ab225a.dll windows x86
8bc9209e6120a7efdca54aadd7440577
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleA
DeleteFileA
Sleep
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
TerminateProcess
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GlobalUnlock
Process32Next
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
OpenProcess
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
ExitProcess
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GetLastError
SetErrorMode
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
GetWindowsDirectoryA
IsBadReadPtr
user32
GetWindowThreadProcessId
wsprintfA
UnhookWindowsHookEx
PostMessageA
GetWindowTextA
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetOpenW
InternetOpenUrlW
ws2_32
inet_ntoa
getpeername
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
msvcrt
_strlwr
time
srand
strcmp
strstr
atoi
strchr
strrchr
strcat
strlen
__CxxFrameHandler
sprintf
??3@YAXPAX@Z
wcscmp
wcslen
memcpy
memset
strcpy
free
_initterm
malloc
_adjust_fdiv
_stricmp
abort
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vdata Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ