Static task
static1
Behavioral task
behavioral1
Sample
b3822edb4a17ad3a46345ba70bb19b94017973aaf7333fa59cd553310435b2a6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3822edb4a17ad3a46345ba70bb19b94017973aaf7333fa59cd553310435b2a6.dll
Resource
win10v2004-20220812-en
General
-
Target
b3822edb4a17ad3a46345ba70bb19b94017973aaf7333fa59cd553310435b2a6
-
Size
108KB
-
MD5
c1b52f37c42ebd60694ead2c03232319
-
SHA1
738c7bcd9aec7403f6b646ef80a1a533ededc8bc
-
SHA256
b3822edb4a17ad3a46345ba70bb19b94017973aaf7333fa59cd553310435b2a6
-
SHA512
255843f042843bd2b295987f604ffb46d518bad6870171f3f394cf3c9592fa9f749bba7e86b8feff4a9a44ecef8c94b89424c4594300aeed740328b8f405878b
-
SSDEEP
3072:pNKLA9QoVHf6yB3iwzrMDt9TBfhVUIHceq4WC:KLCJPJnz2LTB5VUGcZC
Malware Config
Signatures
Files
-
b3822edb4a17ad3a46345ba70bb19b94017973aaf7333fa59cd553310435b2a6.dll windows x86
d3aee12447f8312951b0081d2f9257d9
Code Sign
4e:37:ff:08:38:ec:0a:47:b2:7a:66:e0:4c:c8:62:b9Certificate
IssuerCN=Root AgencyNot Before31/12/2007, 16:00Not After31/12/2094, 16:00SubjectCN=MicrosoftSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentThreadId
Toolhelp32ReadProcessMemory
OpenProcess
Module32Next
Module32First
Heap32ListNext
Heap32ListFirst
TerminateProcess
LocalAlloc
GetTickCount
HeapAlloc
GetProcessHeap
HeapFree
SleepEx
GetCurrentProcess
Thread32First
GetVersionExA
GetSystemInfo
FreeLibrary
GetWindowsDirectoryA
GetComputerNameA
GlobalMemoryStatus
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcmpA
GetFileAttributesA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
Thread32Next
LocalFree
lstrcpyA
lstrcatA
CreateThread
LoadLibraryA
GetProcAddress
ResetEvent
CreateDirectoryA
CreateFileA
MoveFileExW
MoveFileExA
RemoveDirectoryW
lstrlenA
FindFirstFileA
FindNextFileA
DeleteFileW
SetFileAttributesA
GetLastError
CreateProcessW
GetFileAttributesExW
SetErrorMode
GetDriveTypeW
GetDiskFreeSpaceExW
CreateDirectoryW
CreateFileW
FindFirstFileW
FindNextFileW
FindClose
SetFileAttributesW
MoveFileW
GetFileAttributesW
QueryPerformanceCounter
QueryPerformanceFrequency
GetLocaleInfoA
WideCharToMultiByte
PeekNamedPipe
ReadFile
WriteFile
SetEvent
CreateEventA
WaitForSingleObject
DeleteFileA
Sleep
CopyFileA
CreatePipe
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetStartupInfoA
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
MultiByteToWideChar
GetUserDefaultLCID
lstrcmpiA
gdi32
RealizePalette
GetStockObject
SelectPalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateDCA
GetDeviceCaps
DeleteDC
advapi32
ImpersonateLoggedOnUser
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceStatus
ChangeServiceConfig2A
LockServiceDatabase
UnlockServiceDatabase
ChangeServiceConfigA
EnumServicesStatusExA
QueryServiceConfigA
QueryServiceConfig2A
RegSaveKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegQueryInfoKeyA
CreateProcessAsUserA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegEnumKeyExA
RevertToSelf
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptEncrypt
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
RegCloseKey
user32
GetDC
ReleaseDC
CloseWindowStation
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
SetCursorPos
CloseDesktop
wsprintfA
SendMessageA
PeekMessageA
GetKeyState
CallNextHookEx
GetForegroundWindow
GetWindowTextW
UnhookWindowsHookEx
SetWindowsHookExA
GetMessageA
keybd_event
mouse_event
ExitWindowsEx
DispatchMessageA
SetThreadDesktop
IsWindow
TranslateMessage
urlmon
URLDownloadToCacheFileA
msvcrt
sprintf
_wcsicmp
_wcsnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
fputc
_errno
_fdopen
strchr
_strnicmp
srand
rand
wcsncpy
wcsstr
_ui64toa
ceil
_vsnprintf
_CxxThrowException
memcmp
_beginthread
swprintf
time
localtime
fwprintf
wcsftime
atoi
strcmp
__CxxFrameHandler
_EH_prolog
strcpy
_mbsnbcat
strlen
fclose
fwrite
fseek
fread
fopen
_beginthreadex
strncmp
free
memset
malloc
_makepath
_splitpath
wcslen
??2@YAPAXI@Z
_except_handler3
memcpy
??3@YAXPAX@Z
_ftol
_stricmp
memmove
wcscpy
strcat
wcscmp
wcscat
_wfopen
_itoa
strncpy
strstr
ftell
fprintf
_mbsrchr
_strlwr
shell32
ord680
psapi
GetModuleFileNameExA
EnumProcessModules
netapi32
Netbios
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ