Static task
static1
Behavioral task
behavioral1
Sample
dad413814cbe5784ccf2b6696ca131bd8c36f8d402049566b46149acc5a54cf6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dad413814cbe5784ccf2b6696ca131bd8c36f8d402049566b46149acc5a54cf6.dll
Resource
win10v2004-20220812-en
General
-
Target
dad413814cbe5784ccf2b6696ca131bd8c36f8d402049566b46149acc5a54cf6
-
Size
180KB
-
MD5
bb64329305ae9d3bad153e5e4d79ca60
-
SHA1
663c72a31f583d000f6a7537934ede051c37f75b
-
SHA256
dad413814cbe5784ccf2b6696ca131bd8c36f8d402049566b46149acc5a54cf6
-
SHA512
7c07d2ccfe9800371404ac0367baf4b46d890672e75812ef8cffd57a7fdb0504c5749abadad898588f8fda6266d28c4b03af34fb0d82e9a7661ea9fbfba63e9a
-
SSDEEP
3072:TFnHc3+GvvGBeQYLjp9IAq2tn2TBfki43y97FozS4Oq1sqH73oGC:ZkvkwLjpjqun2TB8i4i0zLOosqHkG
Malware Config
Signatures
Files
-
dad413814cbe5784ccf2b6696ca131bd8c36f8d402049566b46149acc5a54cf6.dll windows x86
1f5e76572fad36553733428ca3571f53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
kernel32
FindClose
FindFirstFileA
GetVolumeInformationA
WaitForSingleObject
CreateMutexA
OpenMutexA
ReadFile
FindNextFileA
FreeLibrary
GetTempPathA
GetSystemDirectoryA
GetSystemTime
lstrlenA
lstrcpynA
GetComputerNameA
OpenProcess
GetVersionExA
GetModuleFileNameA
LocalFree
LocalAlloc
GetCurrentProcess
GetCurrentThread
CreateMutexW
SetLastError
lstrcpyA
GetVersion
lstrcatA
VirtualFree
ReleaseMutex
VirtualAlloc
OpenMutexW
GetModuleHandleA
LoadLibraryExA
IsBadReadPtr
CreateFileW
GetEnvironmentVariableW
LoadLibraryW
MapViewOfFile
CreateFileMappingA
LoadLibraryA
SetFilePointer
GetProcAddress
CreateThread
Sleep
CreateFileA
WriteFile
CloseHandle
GetFileTime
SetFileTime
CreateProcessA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
FindResourceA
LoadResource
SizeofResource
LockResource
DeleteFileA
GetLastError
CopyFileA
SetFileAttributesA
GetEnvironmentVariableA
GetCurrentProcessId
GetFileSize
user32
UnregisterClassA
SetPropA
CreateWindowExW
DestroyWindow
wsprintfA
UnregisterClassW
advapi32
RegDeleteValueA
RegEnumValueA
LookupAccountNameA
RegEnumKeyExA
LookupAccountSidA
IsValidSid
AccessCheck
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
DuplicateTokenEx
OpenThreadToken
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
msvcrt
_mbschr
_local_unwind2
strcmp
wcsncat
wcscpy
strncmp
_wcsicmp
_adjust_fdiv
_itoa
_stricmp
sscanf
strcat
memset
strstr
strncpy
memcpy
strlen
malloc
strcpy
free
strncat
memcmp
_snprintf
_ftol
realloc
_abnormal_termination
wcscmp
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
_initterm
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ