Static task
static1
Behavioral task
behavioral1
Sample
e1044ae947dd050d403c558f9786698b6ac5a1752bd451991507c07bbc7971d0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1044ae947dd050d403c558f9786698b6ac5a1752bd451991507c07bbc7971d0.dll
Resource
win10v2004-20220812-en
General
-
Target
e1044ae947dd050d403c558f9786698b6ac5a1752bd451991507c07bbc7971d0
-
Size
240KB
-
MD5
de1c19b1b7a38d20128e8e4326110093
-
SHA1
bb4774cb8ecaeaebeaf3f99fe8471bab9ae1a4d4
-
SHA256
e1044ae947dd050d403c558f9786698b6ac5a1752bd451991507c07bbc7971d0
-
SHA512
8006f3e3a21b3cf51cdeba5396f3de92e134b783628334b9938c2f13aaa8f43f66c21eac1f990e427b71fbe88d52289f1ccf3e8ba6a029913e3d4d57a45cf5cb
-
SSDEEP
768:muoVAr/JIZVx2u1kktyh6/jFoWbWNq3eB5aBBQARQkZpq:mVVc/JIkLkn3eB5aBBQAR
Malware Config
Signatures
Files
-
e1044ae947dd050d403c558f9786698b6ac5a1752bd451991507c07bbc7971d0.dll windows x86
ffb0f71f7a562ce7b3fa011c8663659e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strstr
memcpy
memcmp
_snprintf
RtlZeroMemory
RtlUnwind
strlen
ws2_32
closesocket
gethostname
kernel32
lstrcpyA
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
GetTempFileNameA
GetStartupInfoA
GetLastError
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
CloseHandle
CreateThread
GetCurrentDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
IsBadReadPtr
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
GetFileSize
lstrcpynA
lstrlenA
lstrcmpA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
VirtualAlloc
user32
wsprintfA
KillTimer
SetTimer
CallNextHookEx
GetWindowThreadProcessId
RegisterWindowMessageA
SendMessageA
UnhookWindowsHookEx
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ