ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
4eee2638f7ba14f764c2d77d04a2160f7dcaa8009eedb3746de30f48f0b5f3c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4eee2638f7ba14f764c2d77d04a2160f7dcaa8009eedb3746de30f48f0b5f3c5.dll
Resource
win10v2004-20221111-en
General
-
Target
4eee2638f7ba14f764c2d77d04a2160f7dcaa8009eedb3746de30f48f0b5f3c5
-
Size
160KB
-
MD5
3d8d5b2a546f54d6fcdd874bc4cee11d
-
SHA1
e9234a1f0368199d978905c5dcecb7679401e70a
-
SHA256
4eee2638f7ba14f764c2d77d04a2160f7dcaa8009eedb3746de30f48f0b5f3c5
-
SHA512
30f5c8f29f7920218af340001ca9d999e7e48c4af9952f7da2709e58a131f971e050b925d36092a808a2af5687f6d3f37154a543f0f069e6f8ddd4082466a10a
-
SSDEEP
3072:gpiLbe2DDrHPkHV7UqWNFch3ieB6SYYWLQX5+4kTR84stYxy:Fk17ZW7chSvSRWX4k98Rwy
Malware Config
Signatures
Files
-
4eee2638f7ba14f764c2d77d04a2160f7dcaa8009eedb3746de30f48f0b5f3c5.dll windows x86
83f0d9091e7ebdb50240ebd09ccda20d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
GetLastError
LocalAlloc
SetLastError
LocalFree
GetVersion
GetCurrentProcess
MoveFileExA
MoveFileA
GetVersionExA
SetFilePointer
GetFileSize
TerminateProcess
ReadFile
GetSystemInfo
SetErrorMode
lstrcmpiA
GetCurrentThreadId
lstrcmpA
MultiByteToWideChar
FreeLibrary
lstrcatA
CreateEventA
lstrlenA
Sleep
GetLocalTime
GetTickCount
InterlockedExchange
lstrcpyA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
TerminateThread
CloseHandle
ExpandEnvironmentStringsA
user32
DestroyCursor
SendMessageA
MapVirtualKeyA
CloseClipboard
LoadCursorA
EmptyClipboard
OpenClipboard
CreateWindowExA
IsWindow
MessageBoxA
FindWindowA
CharNextA
SetClipboardData
wsprintfA
GetThreadDesktop
IsWindowVisible
GetProcessWindowStation
OpenWindowStationA
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
PostMessageA
GetSystemMetrics
GetClipboardData
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateDIBSection
CreateCompatibleBitmap
SelectObject
advapi32
RegQueryValueExA
OpenProcessToken
GetTokenInformation
RegOpenKeyA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegCloseKey
RegQueryValueA
msvcrt
_strnicmp
_beginthreadex
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_strcmpi
wcstombs
realloc
putchar
strncat
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_CxxThrowException
rand
puts
sprintf
strncpy
strchr
malloc
free
_except_handler3
strrchr
atoi
strncmp
_errno
wcscpy
_snprintf
ws2_32
recvfrom
__WSAFDIsSet
ioctlsocket
gethostname
listen
getpeername
getsockname
inet_ntoa
recv
htonl
WSASocketA
sendto
socket
closesocket
inet_addr
send
select
ntohs
gethostbyname
htons
setsockopt
WSACleanup
WSAIoctl
bind
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
netapi32
NetLocalGroupAddMembers
NetUserAdd
msvfw32
ICSendMessage
wtsapi32
WTSFreeMemory
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ