ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
c8bd4e43093da79982283a17a772ed0d953743b329bb1f14f08da18148f32813.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8bd4e43093da79982283a17a772ed0d953743b329bb1f14f08da18148f32813.dll
Resource
win10v2004-20220812-en
General
-
Target
c8bd4e43093da79982283a17a772ed0d953743b329bb1f14f08da18148f32813
-
Size
26KB
-
MD5
70ae998769faa3d0e91bdfe36c314aed
-
SHA1
91ef125fc522d4aa025b6cd3ccd26ce1922f4729
-
SHA256
c8bd4e43093da79982283a17a772ed0d953743b329bb1f14f08da18148f32813
-
SHA512
c28eba2350e4159d37665d83ab5f0aa471f827add1fc7c0e57a14fb20011d2b708f369416f4934f2df60d40168b645cb0d7adb333adcf94014c18b09509f8a27
-
SSDEEP
768:w0CbwJ6CldQ6xMp19YeOKfdGDImYFp5v8iF3L:lYCldQK6v8iF3L
Malware Config
Signatures
Files
-
c8bd4e43093da79982283a17a772ed0d953743b329bb1f14f08da18148f32813.dll windows x86
6b9768e35dd7c73fc7d970d1c4ab749f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
MoveFileExA
FreeLibraryAndExitThread
DeleteFileA
CreateDirectoryA
CopyFileA
LockResource
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
GetTickCount
Process32First
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
CreateEventA
DuplicateHandle
LoadLibraryExA
GetModuleHandleA
GlobalMemoryStatusEx
GetVersionExA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
CreateThread
GetModuleFileNameA
GetLongPathNameA
lstrcmpiA
OutputDebugStringA
WriteFile
GetTempPathA
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
GetLocalTime
GetStartupInfoA
ExpandEnvironmentStringsA
CreateProcessA
Sleep
CreateToolhelp32Snapshot
Thread32First
Thread32Next
WaitForSingleObject
TerminateProcess
Process32Next
CloseHandle
user32
wsprintfW
wsprintfA
EnumThreadWindows
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
GetClassNameA
MoveWindow
FindWindowExA
PostMessageA
advapi32
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegQueryValueExA
QueryServiceStatus
StartServiceA
RegSetValueExA
RegCreateKeyExA
CreateServiceA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegOpenKeyExA
ws2_32
gethostbyname
inet_addr
WSAStartup
setsockopt
getsockopt
closesocket
connect
htons
socket
send
gethostname
recv
ntdll
RtlInitUnicodeString
_strcmpi
RtlEqualUnicodeString
NtQueryObject
NtQuerySystemInformation
wtsapi32
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MySec Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ