Entry
Static task
static1
Behavioral task
behavioral1
Sample
ea873c2534f5bd2ad2f7ce9c43e6b75fd8b6fffa140379bb861756ebc1937feb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea873c2534f5bd2ad2f7ce9c43e6b75fd8b6fffa140379bb861756ebc1937feb.dll
Resource
win10v2004-20220901-en
General
-
Target
ea873c2534f5bd2ad2f7ce9c43e6b75fd8b6fffa140379bb861756ebc1937feb
-
Size
52KB
-
MD5
a00540ffd4b73e6a88ee2c51beac4dc0
-
SHA1
dc2e36820f18e8b65b9045ca4ced7291d0283701
-
SHA256
ea873c2534f5bd2ad2f7ce9c43e6b75fd8b6fffa140379bb861756ebc1937feb
-
SHA512
659dfb07f493c528e8a064419fbc3688db234169a2e88f715e1016004a97229818a5a0a016190b8a434690e895e114e82907a160ad891030fb11626df2b2d6cf
-
SSDEEP
1536:TQ9IsIabLdawo8gLLCzLE3/UU9UUpDUkp:TIFIML4wPgLLCzLE3/UU9UUpDUkp
Malware Config
Signatures
Files
-
ea873c2534f5bd2ad2f7ce9c43e6b75fd8b6fffa140379bb861756ebc1937feb.dll windows x86
f92504077553cd733b65ad078c4c27a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr71
?terminate@@YAXXZ
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_stricmp
_wcsicmp
_itoa
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
rand
_CxxThrowException
_strupr
strcspn
strncmp
strtok
free
malloc
wcscpy
wcslen
memmove
strstr
memcmp
isdigit
atoi
__CxxFrameHandler
fread
exit
strcmp
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_mbsicmp
strcpy
strcat
fopen
sprintf
fclose
printf
??2@YAPAXI@Z
strncpy
??3@YAXPAX@Z
memset
_except_handler3
strlen
memcpy
_strnicmp
kernel32
TerminateProcess
GetCurrentProcess
GetTickCount
lstrcmpiA
GetACP
VirtualProtectEx
GetLocalTime
GetTempPathA
CloseHandle
WriteFile
CreateFileA
Sleep
SetLastError
FormatMessageA
GetLastError
LocalFree
HeapFree
HeapAlloc
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
WaitForSingleObject
CreateProcessA
VirtualAlloc
ReadFile
GetFileSize
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateRemoteThread
OpenProcess
FreeLibrary
LoadLibraryA
DeleteFileA
MoveFileExA
MultiByteToWideChar
CreateThread
ReleaseMutex
CreateMutexA
VirtualFree
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenMutexA
GetCurrentProcessId
GetCurrentThreadId
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetVersionExA
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
GetLongPathNameA
CreatePipe
GetDriveTypeA
FindClose
FindNextFileA
FindFirstFileA
SetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
GlobalMemoryStatus
GetStartupInfoA
user32
CloseDesktop
CloseWindowStation
SetThreadDesktop
ReleaseDC
IsRectEmpty
OpenDesktopA
SetProcessWindowStation
GetSystemMetrics
wsprintfA
MessageBoxA
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
GetDesktopWindow
GetDC
gdi32
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetObjectA
GetStockObject
DeleteObject
CreateDCA
advapi32
LsaNtStatusToWinError
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegQueryValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
shell32
ShellExecuteA
ws2_32
WSACleanup
htons
inet_addr
socket
WSAStartup
accept
listen
setsockopt
connect
closesocket
htonl
sendto
send
select
gethostname
gethostbyname
inet_ntoa
recv
WSASocketA
WSAIoctl
bind
psapi
EnumProcessModules
GetModuleFileNameExA
urlmon
URLDownloadToFileA
wininet
GetUrlCacheEntryInfoA
Exports
Exports
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ