Static task
static1
Behavioral task
behavioral1
Sample
f72851395ede7b5aca8e4bd8373f4368495c2d0e4097bf3bbec6ae9cc270fd43.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f72851395ede7b5aca8e4bd8373f4368495c2d0e4097bf3bbec6ae9cc270fd43.dll
Resource
win10v2004-20220812-en
General
-
Target
f72851395ede7b5aca8e4bd8373f4368495c2d0e4097bf3bbec6ae9cc270fd43
-
Size
22KB
-
MD5
27c823bb7c1325b15a642b8faf12acaf
-
SHA1
8793755ae5b82fb312a462a22d53ee95553815ec
-
SHA256
f72851395ede7b5aca8e4bd8373f4368495c2d0e4097bf3bbec6ae9cc270fd43
-
SHA512
78c16be0388bf482c11f77e20c4b10a91406e1f68c4b1b1cb6b004d68346cf6b6924b652f8e6e4190049adadefe973b07f69e9d457db6859888427103127a65c
-
SSDEEP
384:7YSDNDTqc1DumDUWx23R6KHJEn5B/f3wPBKXih/M/W73BROjS9XcEB3z/F/QMHKs:7YSDg+h23RXAwBDm+9XfV/FNqVVY
Malware Config
Signatures
Files
-
f72851395ede7b5aca8e4bd8373f4368495c2d0e4097bf3bbec6ae9cc270fd43.dll windows x86
0257f186662022d084e23b2ea1f36264
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
wsprintfW
wvsprintfA
ntdll
ZwClose
wcslen
wcsncmp
memcmp
strstr
toupper
strlen
strcpy
wcscpy
_allmul
RtlInitUnicodeString
ZwCreateKey
NtSetValueKey
_snprintf
memcpy
memset
wcsstr
ZwQueryInformationThread
ws2_32
inet_ntoa
getpeername
wininet
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
kernel32
GetFileSize
GetDiskFreeSpaceA
CreateProcessA
DeviceIoControl
LoadLibraryA
InitializeCriticalSection
OpenFileMappingA
GetModuleHandleA
GetProcAddress
VirtualProtect
VirtualProtectEx
ExitThread
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
InterlockedIncrement
lstrcmpiA
DisableThreadLibraryCalls
GetModuleFileNameA
MultiByteToWideChar
CreateThread
CreateFileMappingA
MapViewOfFile
ReadFile
GetEnvironmentVariableW
VirtualAlloc
DeleteFileW
GetFileAttributesW
CreateFileA
OutputDebugStringA
CloseHandle
GetCurrentProcess
CreateRemoteThread
OpenProcess
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateFileW
lstrcatA
GetEnvironmentVariableA
HeapReAlloc
HeapAlloc
HeapCreate
lstrlenA
WaitForSingleObject
Sleep
lstrcmpA
GetVolumeInformationA
WriteFile
SetFilePointer
advapi32
LookupPrivilegeValueA
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorA
AdjustTokenPrivileges
msvcrt
malloc
free
Sections
.text Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 862B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ