ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
c7a214a88d8d0edf661cfec639f88137c1479e2d0e7e008ea3da9382468aa102.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7a214a88d8d0edf661cfec639f88137c1479e2d0e7e008ea3da9382468aa102.dll
Resource
win10v2004-20220812-en
General
-
Target
c7a214a88d8d0edf661cfec639f88137c1479e2d0e7e008ea3da9382468aa102
-
Size
239KB
-
MD5
1b53ed8697e34f57beb326470dc2bb90
-
SHA1
287436578a28787e828ce0fed4382bed21473993
-
SHA256
c7a214a88d8d0edf661cfec639f88137c1479e2d0e7e008ea3da9382468aa102
-
SHA512
68fd37ebfc23c5b19fce502fd8fbffdeb1fdbff16a1864871ee21cd6283006a4bbbf6cd79a7bfb2d26b67c8674bd59723895a23ada496fbf1ee4ce31b5d82d92
-
SSDEEP
3072:Si2uXgztSn1cdtaRZbWeTooDtNeIi2uXgztSn1cdtaRZbWeTooDtNemE:xKOcvKbWeTzx+KOcvKbWeTzx0
Malware Config
Signatures
Files
-
c7a214a88d8d0edf661cfec639f88137c1479e2d0e7e008ea3da9382468aa102.dll windows x86
7f37f5dab283cc55bf5e0df5b48fab12
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
ExitProcess
GetCurrentProcess
GetVersion
DeviceIoControl
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetTickCount
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
LocalSize
OutputDebugStringA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
GetComputerNameA
lstrcmpiA
GetCurrentThreadId
RaiseException
msvcrt
strlen
strstr
memcmp
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
strncpy
atoi
_ftol
_errno
wcscpy
_snprintf
strncat
realloc
wcstombs
_beginthreadex
calloc
_initterm
_adjust_fdiv
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
strncmp
??2@YAPAXI@Z
_strrev
_strnicmp
_strupr
memset
_strcmpi
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvfw32
ICCompressorFree
ICSeqCompressFrameEnd
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICClose
Exports
Exports
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ