ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
e622f7f522c43b6e0d52a6f25407b6db26531739cd7ddfa292f242bd13cebb77.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e622f7f522c43b6e0d52a6f25407b6db26531739cd7ddfa292f242bd13cebb77.dll
Resource
win10v2004-20220901-en
General
-
Target
e622f7f522c43b6e0d52a6f25407b6db26531739cd7ddfa292f242bd13cebb77
-
Size
80KB
-
MD5
af17a2e5053980201ab8e58cd6e64720
-
SHA1
70cac6705010c9a931a7c557116c6f8d4d44f4fd
-
SHA256
e622f7f522c43b6e0d52a6f25407b6db26531739cd7ddfa292f242bd13cebb77
-
SHA512
087db16168d98765058f56e4e334d88c2cff194d3c6a99c6a287adc1a54c6a9b2088650b81adc20cde6fe940d7674d6b26e4d45eee807e23c0f543f9db89702d
-
SSDEEP
1536:kEVoetSspkJ8LZ0Fttsa+Pwo2mqT6KQHj9biWR8KnwTwkBC:kEVah8LavbAcGD9eWR8KnwTxB
Malware Config
Signatures
Files
-
e622f7f522c43b6e0d52a6f25407b6db26531739cd7ddfa292f242bd13cebb77.dll windows x86
78cef0de257054fce97766b6967334b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualAllocEx
SetPriorityClass
GetFileSize
GetCurrentThread
GetPriorityClass
DeviceIoControl
OutputDebugStringA
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetTickCount
MoveFileExA
GetThreadPriority
OpenProcess
CreateProcessA
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
SetThreadPriority
CreateEventA
user32
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetActiveWindow
GetSystemMetrics
SetRect
DestroyCursor
GetDesktopWindow
SendMessageA
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
IsWindow
CloseWindow
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
DispatchMessageA
ReleaseDC
BlockInput
CallNextHookEx
GetDC
GetKeyNameTextA
GetClipboardData
FindWindowA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
ExitWindowsEx
ShowWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
CreateCompatibleBitmap
GetDIBits
advapi32
RegQueryValueExA
RegDeleteKeyA
RegEnumValueA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegEnumKeyExA
RegOpenKeyA
RegCreateKeyExA
RegQueryValueA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteValueA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
??1type_info@@UAE@XZ
_strnset
_adjust_fdiv
_initterm
_strcmpi
calloc
_beginthreadex
wcstombs
realloc
strncat
_snprintf
_errno
strncmp
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
strstr
strlen
_ftol
ceil
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
winmm
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInUnprepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInClose
waveOutReset
waveOutClose
waveInPrepareHeader
waveOutUnprepareHeader
ws2_32
gethostbyname
socket
inet_addr
closesocket
recv
select
send
setsockopt
inet_ntoa
gethostname
getpeername
htons
connect
ioctlsocket
__WSAFDIsSet
recvfrom
bind
getsockname
WSACleanup
WSAStartup
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ