ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
8888ec3d8341a08ef79e472f1a17b3f2c4c81ba3843c4fc3fd0cf3ad09e7069f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8888ec3d8341a08ef79e472f1a17b3f2c4c81ba3843c4fc3fd0cf3ad09e7069f.dll
Resource
win10v2004-20221111-en
General
-
Target
8888ec3d8341a08ef79e472f1a17b3f2c4c81ba3843c4fc3fd0cf3ad09e7069f
-
Size
94KB
-
MD5
78be4c5a204d78b28727b7a0b43a0ec0
-
SHA1
6f2e97192498680515ae62b9a1172996a4ff3f85
-
SHA256
8888ec3d8341a08ef79e472f1a17b3f2c4c81ba3843c4fc3fd0cf3ad09e7069f
-
SHA512
a1593bba84c58b5218d28410c8c8c747192779087af2490d69283cab98abc5eae9b191d96871adeadc97f853761f4981cdd56f0c3553908e52940f26573b9daf
-
SSDEEP
1536:ggMSiEXT9bLsjdG8xzkhuiBnPnnGW1bOZQ+tcGjmfehgu3h9Zqixz2jGKi5:9MSie/IdG8xAh5BPnnvbOm+tBjQehgCz
Malware Config
Signatures
Files
-
8888ec3d8341a08ef79e472f1a17b3f2c4c81ba3843c4fc3fd0cf3ad09e7069f.dll windows x86
421e3c5ccaa6924397526e17dc166ff5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncat
strchr
time
srand
rand
atoi
strncpy
strcat
strcpy
strcmp
realloc
_except_handler3
malloc
free
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
wcstombs
_beginthreadex
calloc
__dllonexit
_onexit
strrchr
memmove
memcpy
_strnicmp
_strcmpi
??3@YAXPAX@Z
kernel32
FindNextFileA
GetCurrentThreadId
lstrcmpiA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetTempPathA
FreeConsole
SetUnhandledExceptionFilter
GetLocalTime
SetErrorMode
OpenEventA
ReleaseMutex
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
WaitForMultipleObjects
PeekNamedPipe
DisconnectNamedPipe
CreatePipe
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OutputDebugStringA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
FindClose
LocalFree
RaiseException
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
ReadFile
SetFilePointer
SetLastError
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FreeLibrary
OpenProcess
ExitThread
CreateThread
MoveFileExA
GetWindowsDirectoryA
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
Exports
Exports
Sections
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ