Static task
static1
Behavioral task
behavioral1
Sample
a055708a4e28a780250fc5cc01e77b7a596862094cdff11e38dc77ef2b6b783c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a055708a4e28a780250fc5cc01e77b7a596862094cdff11e38dc77ef2b6b783c.dll
Resource
win10v2004-20221111-en
General
-
Target
a055708a4e28a780250fc5cc01e77b7a596862094cdff11e38dc77ef2b6b783c
-
Size
28KB
-
MD5
3f8fe45386bcadbac1a6d05a3297a280
-
SHA1
b43e805f066c0550da81d6c966113e6d1e02d311
-
SHA256
a055708a4e28a780250fc5cc01e77b7a596862094cdff11e38dc77ef2b6b783c
-
SHA512
22992616c42abb50e0c648c0fe2fa2db67f87be2aeff2d2db7d33ac2cea4e118781a5aaf0a2388f937a57f6bdb07e1fd7040e916edf6378f785d09f74130a229
-
SSDEEP
384:xQ4Gle4xIGVDiV25hZODKFAY2ElgAKMDybiD2MHeX8PAdvCBWgKPgY4RpE:xQloE5h4DVElg3MDyWeXfRgKPlw
Malware Config
Signatures
Files
-
a055708a4e28a780250fc5cc01e77b7a596862094cdff11e38dc77ef2b6b783c.dll windows x86
b75240f23e38a79bb66ee4307d2164aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetPrivateProfileStringA
ExitProcess
GetModuleHandleA
IsBadReadPtr
GetCommandLineA
GetComputerNameA
CreateMutexA
GetModuleFileNameA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
SetFilePointer
GlobalFree
InitializeCriticalSection
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
WriteProcessMemory
TerminateThread
WriteFile
SetEvent
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetFileSize
GetTempPathA
user32
FindWindowA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_strlwr
_stricmp
fopen
fread
fclose
wcslen
strcat
sprintf
memcpy
strlen
strcpy
memset
??2@YAPAXI@Z
strrchr
strstr
memcmp
strncpy
strchr
strcmp
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ