Static task
static1
Behavioral task
behavioral1
Sample
94583011ea5732b7ed34efd395c7f00504e611a82e8a6c7f2277592b687096d5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94583011ea5732b7ed34efd395c7f00504e611a82e8a6c7f2277592b687096d5.dll
Resource
win10v2004-20220812-en
General
-
Target
94583011ea5732b7ed34efd395c7f00504e611a82e8a6c7f2277592b687096d5
-
Size
109KB
-
MD5
b28ab7e6f47d504fd53658b6d1f6eb58
-
SHA1
1f980c5ef2aed0e8960394887d4e28983c893174
-
SHA256
94583011ea5732b7ed34efd395c7f00504e611a82e8a6c7f2277592b687096d5
-
SHA512
82072b83ba5eda3891345bcd4002c883f5b11511540bc081068fdbd0efbe030241aa58c401f1178c1ec12bdf772062e88cc0f5bcb5896aa0dce404d52c70ec64
-
SSDEEP
3072:ksRzLoIHJrB/98o7YABkZACTBfGm/0HNeqQ:5zJpZ98o7LOvTBum/iN
Malware Config
Signatures
Files
-
94583011ea5732b7ed34efd395c7f00504e611a82e8a6c7f2277592b687096d5.dll windows x86
6105c498384962890bb611211aa31cb1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Thread32First
GetModuleFileNameA
GetCurrentThreadId
Toolhelp32ReadProcessMemory
OpenProcess
Module32Next
Module32First
Heap32ListNext
Heap32ListFirst
TerminateProcess
LocalAlloc
GetTickCount
HeapAlloc
GetProcessHeap
HeapFree
SleepEx
Thread32Next
lstrcmpiA
GetVersionExA
GetSystemInfo
FreeLibrary
GetWindowsDirectoryA
GetComputerNameA
GlobalMemoryStatus
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcmpA
GetFileAttributesA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
lstrcpyA
lstrcatA
CreateThread
LoadLibraryA
GetVersion
DeviceIoControl
GetProcAddress
ResetEvent
CreateDirectoryA
CreateFileA
MoveFileExW
MoveFileExA
RemoveDirectoryW
lstrlenA
FindFirstFileA
FindNextFileA
DeleteFileW
SetFileAttributesA
GetLastError
CreateProcessW
GetFileAttributesExW
SetErrorMode
GetDriveTypeW
GetDiskFreeSpaceExW
CreateDirectoryW
CreateFileW
FindFirstFileW
FindNextFileW
FindClose
SetFileAttributesW
MoveFileW
GetFileAttributesW
QueryPerformanceCounter
GetLocaleInfoA
QueryPerformanceFrequency
WideCharToMultiByte
PeekNamedPipe
ReadFile
WriteFile
SetEvent
CreateEventA
WaitForSingleObject
DeleteFileA
Sleep
CopyFileA
CreatePipe
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetStartupInfoA
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
MultiByteToWideChar
GetUserDefaultLCID
GetCurrentProcess
gdi32
RealizePalette
GetStockObject
SelectPalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateDCA
GetDeviceCaps
DeleteDC
advapi32
ImpersonateLoggedOnUser
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceStatus
ChangeServiceConfig2A
LockServiceDatabase
UnlockServiceDatabase
ChangeServiceConfigA
EnumServicesStatusExA
QueryServiceConfigA
QueryServiceConfig2A
RegSaveKeyA
RegDeleteValueA
RegCreateKeyExA
RegQueryInfoKeyA
CreateProcessAsUserA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegEnumKeyExA
RevertToSelf
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptEncrypt
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
RegCloseKey
user32
GetDC
ReleaseDC
CloseWindowStation
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
SetCursorPos
CloseDesktop
wsprintfA
SendMessageA
PeekMessageA
GetKeyState
CallNextHookEx
GetForegroundWindow
GetWindowTextW
UnhookWindowsHookEx
SetWindowsHookExA
GetMessageA
keybd_event
mouse_event
ExitWindowsEx
DispatchMessageA
SetThreadDesktop
IsWindow
TranslateMessage
urlmon
URLDownloadToCacheFileA
msvcrt
sprintf
_wcsicmp
_wcsnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
fputc
_errno
_fdopen
strchr
_strnicmp
srand
rand
wcsncpy
wcsstr
_ui64toa
ceil
_vsnprintf
memcmp
_CxxThrowException
_beginthread
swprintf
time
localtime
fwprintf
wcsftime
atoi
strcmp
__CxxFrameHandler
_EH_prolog
strcpy
_mbsnbcat
strlen
fclose
fwrite
fseek
fread
fopen
_beginthreadex
strncmp
free
memset
malloc
_makepath
_splitpath
wcslen
??2@YAPAXI@Z
_except_handler3
memcpy
??3@YAXPAX@Z
_ftol
_stricmp
memmove
wcscpy
strcat
wcscmp
wcscat
_wfopen
_itoa
strncpy
strstr
ftell
fprintf
_mbsrchr
_strlwr
shell32
ord680
psapi
GetModuleFileNameExA
EnumProcessModules
netapi32
Netbios
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ