Static task
static1
Behavioral task
behavioral1
Sample
ecf2fc055bae7ff44ac7af6aba399c37ba6840e2f90f766963f3c725d7fa45ad.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecf2fc055bae7ff44ac7af6aba399c37ba6840e2f90f766963f3c725d7fa45ad.dll
Resource
win10v2004-20221111-en
General
-
Target
ecf2fc055bae7ff44ac7af6aba399c37ba6840e2f90f766963f3c725d7fa45ad
-
Size
42KB
-
MD5
73b2ddd1770f53792416fe0b0d8c7cdf
-
SHA1
8c9da5f49d10309277918982620753924b705918
-
SHA256
ecf2fc055bae7ff44ac7af6aba399c37ba6840e2f90f766963f3c725d7fa45ad
-
SHA512
9e75ffe9b89e8bbe30294ca7109ae4b3bc003cb7bd19aa43403e8eb04df1f81fa1f2d0b82081f3f8aab24f53b37160df0368129c1183de1c1cb490ef04fc4dfe
-
SSDEEP
768:QCvofXWSIixF5tiPHsS3B2h9CRR58gW0NOHdrZLLDY+Vb2pGFwe:XofGSIifMxMCf2g89VQpGi
Malware Config
Signatures
Files
-
ecf2fc055bae7ff44ac7af6aba399c37ba6840e2f90f766963f3c725d7fa45ad.dll windows x86
c93610baf0229ca6221d33f96d6af0aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
strstr
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
memset
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
ws2_32
bind
sendto
setsockopt
gethostname
WSAResetEvent
socket
WSAStartup
getaddrinfo
WSACleanup
freeaddrinfo
WSAAddressToStringA
gethostbyname
WSACreateEvent
closesocket
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
psapi
GetModuleFileNameExA
GetModuleInformation
rpcrt4
UuidFromStringA
UuidToStringA
wintrust
WinVerifyTrust
wininet
GetUrlCacheEntryInfoA
kernel32
GetSystemDirectoryA
GetTickCount
CopyFileA
lstrcpyA
GetFileTime
FindNextFileA
DeviceIoControl
GetModuleFileNameA
ResumeThread
TransactNamedPipe
TerminateProcess
GlobalAlloc
GlobalFree
GetLocalTime
ExitProcess
UnmapViewOfFile
GetCurrentThreadId
OpenThread
CreateNamedPipeA
GetLastError
FlushFileBuffers
DisconnectNamedPipe
ExitThread
OpenEventA
CreateFileMappingA
FindClose
RemoveDirectoryA
Thread32Next
ConnectNamedPipe
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
CreateToolhelp32Snapshot
FreeLibrary
CreateFileA
lstrlenA
WaitForSingleObject
OpenProcess
TerminateThread
Sleep
ReadFile
lstrcmpiA
GetExitCodeThread
WinExec
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
CreateThread
GetProcAddress
LoadLibraryA
GetModuleHandleA
LoadLibraryExA
GetFileSize
SetFilePointer
MapViewOfFile
GetLogicalDriveStringsA
lstrcpynA
SetEndOfFile
SetEvent
FlushViewOfFile
SetFileTime
GetWindowsDirectoryA
WriteFile
GetDriveTypeA
CreateEventA
GetExitCodeProcess
CreateProcessA
lstrcatA
MultiByteToWideChar
FindFirstFileA
GetCurrentProcessId
user32
SetProcessWindowStation
OpenDesktopA
wsprintfA
OpenWindowStationA
SetThreadDesktop
advapi32
CreateProcessAsUserA
CloseServiceHandle
RegSetValueExA
CreateServiceA
StartServiceA
RegOpenKeyExA
OpenSCManagerA
RegCloseKey
OpenProcessToken
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ