Static task
static1
Behavioral task
behavioral1
Sample
c3de54530d75e4e6061308a99864c4c37696f00f8aca16e73178d233c654ef7a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3de54530d75e4e6061308a99864c4c37696f00f8aca16e73178d233c654ef7a.dll
Resource
win10v2004-20220901-en
General
-
Target
c3de54530d75e4e6061308a99864c4c37696f00f8aca16e73178d233c654ef7a
-
Size
24KB
-
MD5
59a4203e6dc9a8dee4a25d4dfe2fa4c7
-
SHA1
117397e7958d9282d5df1e54f4d5ce4b0ded0778
-
SHA256
c3de54530d75e4e6061308a99864c4c37696f00f8aca16e73178d233c654ef7a
-
SHA512
8bc5cf5cd1e45dcbe7e501e64dcce39ee43927605bcd2bd37aeca43cbd83b881b2f6a40fb2307a331b23ece3ae805b949079a2380caebf9700ce4d9b64021c50
-
SSDEEP
384:Y17C+1KUr/HaOzNp7NYv7erohZRgpeOKigKfLt2Mku44Z+TipH:Yhh2ozQ7e8hZSp4igyf44Za2H
Malware Config
Signatures
Files
-
c3de54530d75e4e6061308a99864c4c37696f00f8aca16e73178d233c654ef7a.dll windows x86
b9cdc4a7192a285cf194622e1e7b4080
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GlobalLock
GlobalAlloc
GetCurrentThread
GetProcAddress
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadProcessMemory
GlobalUnlock
SetUnhandledExceptionFilter
ResumeThread
SetThreadContext
SuspendThread
OpenThread
WriteProcessMemory
GlobalFree
GetCommandLineA
IsBadReadPtr
Sleep
TerminateThread
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
GetModuleFileNameA
CreateThread
GetCurrentProcessId
OpenMutexA
GetModuleHandleA
CreateMutexA
user32
ToUnicode
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetAsyncKeyState
FindWindowA
GetWindowThreadProcessId
GetKeyboardState
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
_stricmp
free
_initterm
malloc
_adjust_fdiv
_strlwr
wcslen
memset
fopen
fread
fclose
sscanf
strcat
sprintf
strcpy
memcpy
strrchr
strlen
strcmp
??2@YAPAXI@Z
strncpy
strstr
??3@YAXPAX@Z
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ