ConnectTo
InjectProcessConnectTo
StopClient
Static task
static1
Behavioral task
behavioral1
Sample
c8ab6c06b2636145e18cc5f88c83735d7f5b1ec6d55804c7221e494b1ea33e61.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8ab6c06b2636145e18cc5f88c83735d7f5b1ec6d55804c7221e494b1ea33e61.dll
Resource
win10v2004-20220901-en
Target
c8ab6c06b2636145e18cc5f88c83735d7f5b1ec6d55804c7221e494b1ea33e61
Size
88KB
MD5
47f9a9251d0b718b3e93c21b24a7cd4b
SHA1
213a2bd32bdaa26277eb918461b0eb8f456b4261
SHA256
c8ab6c06b2636145e18cc5f88c83735d7f5b1ec6d55804c7221e494b1ea33e61
SHA512
b57fbb9cf34a6bf19c7ba4585f63773198ac6c472e0939e2c7cec50aef0795ee55a23406b8ba4c36ca14a2c0c34ac104c01ec438f18c8c63bf02acf8f2b917ec
SSDEEP
1536:nML8BPUt7wYKwhbZMzaBTBH/oJaGjE7MrBoAl4ryxro1v:qx7BKKb/6jBrB5l4ryxro1v
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileA
Sleep
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetTempPathA
CreateDirectoryA
MoveFileA
WriteFile
PeekNamedPipe
CreateProcessA
GetStartupInfoA
CreatePipe
GetDiskFreeSpaceExA
GetDriveTypeA
FindClose
FindNextFileA
FindFirstFileA
lstrcatA
GetVersionExA
GlobalMemoryStatus
GetFileSize
CreateRemoteThread
SetEndOfFile
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
ReadFile
GetTickCount
lstrlenA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetProcAddress
lstrcpyA
OpenProcess
VirtualAllocEx
VirtualFreeEx
WriteProcessMemory
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetModuleHandleA
CreateThread
WaitForSingleObject
SetEvent
HeapCreate
HeapDestroy
RaiseException
CloseHandle
CreateEventA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
HeapSize
HeapAlloc
HeapReAlloc
TerminateProcess
ExitProcess
RtlUnwind
GetCommandLineA
GetVersion
GetSystemMetrics
ReleaseDC
DrawIcon
GetCursorPos
IsRectEmpty
GetCursor
IsWindow
SendMessageA
MessageBoxA
DefWindowProcA
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetDC
wsprintfA
SelectPalette
RealizePalette
GetDIBits
GetStockObject
CreateDCA
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
GetObjectA
RegQueryValueExA
LookupPrivilegeValueA
RegOpenKeyExA
AdjustTokenPrivileges
RegCloseKey
OpenProcessToken
ShellExecuteA
SHFileOperationA
capGetDriverDescriptionA
capCreateCaptureWindowA
recv
send
closesocket
setsockopt
connect
socket
ntohl
inet_addr
select
htonl
htons
inet_ntoa
gethostbyname
WSACloseEvent
WSAGetOverlappedResult
WSAResetEvent
WSAWaitForMultipleEvents
WSAGetLastError
WSASend
WSACreateEvent
WSAStartup
URLDownloadToFileA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
ConnectTo
InjectProcessConnectTo
StopClient
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ