ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
be25a24256edf21c9e84d40cc85c45d5d4f8ae13f6f999d020be551f3c2ee67f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be25a24256edf21c9e84d40cc85c45d5d4f8ae13f6f999d020be551f3c2ee67f.dll
Resource
win10v2004-20220812-en
General
-
Target
be25a24256edf21c9e84d40cc85c45d5d4f8ae13f6f999d020be551f3c2ee67f
-
Size
26KB
-
MD5
26b21870e255ff1ca96a58a9258ece05
-
SHA1
e58fadde289ef3b62a693d73a6c9deb7f1014b72
-
SHA256
be25a24256edf21c9e84d40cc85c45d5d4f8ae13f6f999d020be551f3c2ee67f
-
SHA512
a59eb44716a1fe7c05cd68ba79e07e635927863715767052f71a41240890c0d074a9ba51e28896251959883ab297e3e669763ee9dbc988484aec00385729e328
-
SSDEEP
768:w0CbwE6CldQ6xMp19YeOKfdGDImYFp5vniF3L:lFCldQK6vniF3L
Malware Config
Signatures
Files
-
be25a24256edf21c9e84d40cc85c45d5d4f8ae13f6f999d020be551f3c2ee67f.dll windows x86
6b9768e35dd7c73fc7d970d1c4ab749f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
MoveFileExA
FreeLibraryAndExitThread
DeleteFileA
CreateDirectoryA
CopyFileA
LockResource
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
GetTickCount
Process32First
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
CreateEventA
DuplicateHandle
LoadLibraryExA
GetModuleHandleA
GlobalMemoryStatusEx
GetVersionExA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
CreateThread
GetModuleFileNameA
GetLongPathNameA
lstrcmpiA
OutputDebugStringA
WriteFile
GetTempPathA
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
GetLocalTime
GetStartupInfoA
ExpandEnvironmentStringsA
CreateProcessA
Sleep
CreateToolhelp32Snapshot
Thread32First
Thread32Next
WaitForSingleObject
TerminateProcess
Process32Next
CloseHandle
user32
wsprintfW
wsprintfA
EnumThreadWindows
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
GetClassNameA
MoveWindow
FindWindowExA
PostMessageA
advapi32
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegQueryValueExA
QueryServiceStatus
StartServiceA
RegSetValueExA
RegCreateKeyExA
CreateServiceA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegOpenKeyExA
ws2_32
gethostbyname
inet_addr
WSAStartup
setsockopt
getsockopt
closesocket
connect
htons
socket
send
gethostname
recv
ntdll
RtlInitUnicodeString
_strcmpi
RtlEqualUnicodeString
NtQueryObject
NtQuerySystemInformation
wtsapi32
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MySec Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ