Static task
static1
Behavioral task
behavioral1
Sample
c6b7c8cdde466ed56ec73bede78e643ea01556c7e599016ac293a82c669898bf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6b7c8cdde466ed56ec73bede78e643ea01556c7e599016ac293a82c669898bf.dll
Resource
win10v2004-20220812-en
General
-
Target
c6b7c8cdde466ed56ec73bede78e643ea01556c7e599016ac293a82c669898bf
-
Size
48KB
-
MD5
e151627011647a7531df721e01e2faec
-
SHA1
99d08569e69d7ebb3c4894d7a03920691b25ad6b
-
SHA256
c6b7c8cdde466ed56ec73bede78e643ea01556c7e599016ac293a82c669898bf
-
SHA512
3ce37826031e1c04d5ae77b56b4a0d24c174cb2108438be63ef4eb5223ff0bed0206bf2372bdd907a9e7ad1371050bfb4abda0f19ddccb1e1ce0ba48232d244b
-
SSDEEP
768:bXPbE7StiKmiNTgNPJOsWRbMArCdpPuljSsBBQARQk0+EqUiSEd0Xa2b:b/YOvNTEYSsBBQARkjqUiSEd8b
Malware Config
Signatures
Files
-
c6b7c8cdde466ed56ec73bede78e643ea01556c7e599016ac293a82c669898bf.dll windows x86
349429271343c70b80b4340a92abfb2a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_snprintf
RtlUnwind
memcmp
memcpy
strstr
RtlZeroMemory
strlen
ws2_32
gethostname
kernel32
CreateFileA
IsBadReadPtr
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualProtectEx
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
ReadProcessMemory
Sleep
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetProcAddress
LoadLibraryA
GetTempFileNameA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
GetStartupInfoA
GetSystemDirectoryA
user32
wsprintfA
UnhookWindowsHookEx
SendMessageA
RegisterWindowMessageA
SetWindowLongA
SetTimer
KillTimer
GetWindowThreadProcessId
GetWindowTextA
GetWindowLongA
EnumWindows
CallWindowProcA
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 826B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ