Activate
Static task
static1
Behavioral task
behavioral1
Sample
7007e9c3b7e3ed3748d4d9c98bf425f0753103963354ff38697df394f0642dc0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7007e9c3b7e3ed3748d4d9c98bf425f0753103963354ff38697df394f0642dc0.dll
Resource
win10v2004-20220812-en
General
-
Target
7007e9c3b7e3ed3748d4d9c98bf425f0753103963354ff38697df394f0642dc0
-
Size
18KB
-
MD5
866ff477d4696885637965bc18700fc0
-
SHA1
f402bfcf2069ff773299859dba97653fd46c857e
-
SHA256
7007e9c3b7e3ed3748d4d9c98bf425f0753103963354ff38697df394f0642dc0
-
SHA512
b9a4a0d8a80eb00c93d6d1045f13ff0ef87e18a73f26b91758660c0a596b6c0334b0b370ddee693c485277c4a816a049de1d3c8ddf56da5a5180fe904db6d3e8
-
SSDEEP
192:+0QwjWz0AbjomXPHBKR+4MYTkvT197pH/nzRfg7g6cRIUS7Y3r1lXBlAwq:+xwj2bkmXCDATP1zF/3r1F8wq
Malware Config
Signatures
Files
-
7007e9c3b7e3ed3748d4d9c98bf425f0753103963354ff38697df394f0642dc0.dll windows x86
0da37a1127670c1efa04597e6eb003a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSACleanup
WSAStartup
recv
closesocket
send
gethostbyname
htons
socket
connect
kernel32
CloseHandle
OpenEventA
SetEvent
VirtualQuery
CreateThread
GetTickCount
lstrcatA
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcmpiA
lstrcpyA
lstrcpynA
GetSystemTime
GlobalFree
GlobalAlloc
lstrcmpA
DeleteFileA
GetTempFileNameA
GetTempPathA
WinExec
GetModuleFileNameA
RtlUnwind
WriteFile
CreateFileA
CreateProcessA
GetLastError
FileTimeToSystemTime
FindClose
FindFirstFileA
GetComputerNameA
CreateMutexA
Sleep
ExitProcess
user32
SetWindowsHookExA
CallNextHookEx
SendMessageA
CharLowerA
wsprintfA
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ