ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
c7f3b990acce2a2eec433591d4325351e865abdca445c2f5b4de6a9473e64db9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7f3b990acce2a2eec433591d4325351e865abdca445c2f5b4de6a9473e64db9.dll
Resource
win10v2004-20220812-en
General
-
Target
c7f3b990acce2a2eec433591d4325351e865abdca445c2f5b4de6a9473e64db9
-
Size
156KB
-
MD5
601a9f4a73cc0f0eaab8f2ec427b0c8a
-
SHA1
71d14725c0fae06dcfb90634aad7e1ca92cff4dd
-
SHA256
c7f3b990acce2a2eec433591d4325351e865abdca445c2f5b4de6a9473e64db9
-
SHA512
bb5c630a767906ece1c94da44d49f51d3429cb4ed2ef1bd654c2c8b5fe547b8b59474fbb4a3e4eb16b6dbb3c5c94ddc68de839a6b4fc95da0dc66c7adda78394
-
SSDEEP
3072:rZUvcUe4wmaeGWIZj0+TCKEzylpJ0/dg9N9n0:9mcBTma1/o1KkM
Malware Config
Signatures
Files
-
c7f3b990acce2a2eec433591d4325351e865abdca445c2f5b4de6a9473e64db9.dll windows x86
1c2e33da7aa322ef8c76eee322e67b28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
RtlUnwind
ExitProcess
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
lstrcmpA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
InterlockedIncrement
SetErrorMode
GetModuleHandleA
lstrcatA
WaitForSingleObject
GetCurrentThreadId
InterlockedDecrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
FindNextFileA
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FreeLibrary
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
GetProcAddress
GetModuleFileNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
GetWindowsDirectoryA
GetSystemDirectoryA
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
DeleteFileA
FindFirstFileA
FindClose
GetTickCount
CreateThread
TerminateProcess
Sleep
user32
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
GetPropA
RemovePropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
AdjustWindowRectEx
GetClassInfoA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
MessageBoxA
CharUpperA
GetSubMenu
GetMenuItemCount
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetWindowTextA
DestroyMenu
PostQuitMessage
GetParent
GetWindowLongA
GetMenuItemID
GetMenuState
UnregisterClassA
GetSystemMetrics
UnhookWindowsHookEx
ValidateRect
PeekMessageA
GetKeyState
SendMessageA
DispatchMessageA
CallNextHookEx
SetWindowsHookExA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
EnableWindow
IsWindowEnabled
GetLastActivePopup
RegisterClassA
SetPropA
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetDeviceCaps
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerA
comctl32
ord17
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
UrlUnescapeA
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
ws2_32
send
socket
getprotobyname
closesocket
setsockopt
recv
connect
htons
gethostbyname
psapi
EnumProcessModules
GetModuleFileNameExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ