ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
d770cad39ed5ea72b296b3453263cdc380755f76f42930f18e730ef7a40b81e9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d770cad39ed5ea72b296b3453263cdc380755f76f42930f18e730ef7a40b81e9.dll
Resource
win10v2004-20220812-en
General
-
Target
d770cad39ed5ea72b296b3453263cdc380755f76f42930f18e730ef7a40b81e9
-
Size
94KB
-
MD5
2fdb39a041ba44e46794157777fb48b0
-
SHA1
1a6f92e145d65651040a1deea464e09338bc4610
-
SHA256
d770cad39ed5ea72b296b3453263cdc380755f76f42930f18e730ef7a40b81e9
-
SHA512
e29bc7c9eea103389ce3bf7754643a275660506e8a64d2ac3a9c91d327cbc8cbccea65d707e80cedb0ca38da59590868acac9e46307fc0675350a7f104e87b02
-
SSDEEP
1536:9pxmEnN/VxO8GYDzrye48hwA3ypZzBIToUlGtcx7cyRSXf8tUgRaN04fzF991yUT:9H/xOYDzphwYK8Yu7/RSP8tUE4p9ryUT
Malware Config
Signatures
Files
-
d770cad39ed5ea72b296b3453263cdc380755f76f42930f18e730ef7a40b81e9.dll windows x86
b13c969eaebbb60ba45c276f20b58eec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetStartupInfoA
CreatePipe
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetPrivateProfileStringA
GetVersionExA
ReleaseMutex
OpenEventA
WritePrivateProfileStringA
GlobalSize
SetUnhandledExceptionFilter
FreeConsole
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GlobalFree
LocalSize
UnmapViewOfFile
GlobalAlloc
GlobalLock
CreateMutexA
GlobalUnlock
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
HeapAlloc
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
GetProcessHeap
HeapFree
CreateFileMappingA
MapViewOfFile
GetLocalTime
GetTickCount
MoveFileExA
OutputDebugStringA
CopyFileA
ResumeThread
SetEvent
WaitForSingleObject
CreateEventA
TerminateThread
CloseHandle
SetErrorMode
user32
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
SetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
SendMessageA
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
DispatchMessageA
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetCursorPos
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
GetActiveWindow
IsWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
gdi32
DeleteObject
BitBlt
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
DeleteDC
advapi32
SetNamedSecurityInfoA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetKeySecurity
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryInfoKeyA
RegSetValueExA
RegRestoreKeyA
RegSaveKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
SetEntriesInAclA
shell32
SHGetFileInfoA
msvcrt
calloc
_strrev
_onexit
__dllonexit
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_strnicmp
_beginthreadex
wcstombs
atoi
realloc
strncat
strchr
sprintf
rename
strncpy
strcat
strcpy
strcmp
strrchr
_except_handler3
malloc
free
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
winmm
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveOutClose
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutGetNumDevs
waveInStart
waveOutOpen
ws2_32
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
closesocket
ntohs
getsockname
gethostname
send
select
recv
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetReadFile
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ