ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
ad78d10e45c74a95a12646d3786f7a49ad62dbe6dd89e3d662ddf64f31e62d69.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad78d10e45c74a95a12646d3786f7a49ad62dbe6dd89e3d662ddf64f31e62d69.dll
Resource
win10v2004-20220812-en
General
-
Target
ad78d10e45c74a95a12646d3786f7a49ad62dbe6dd89e3d662ddf64f31e62d69
-
Size
72KB
-
MD5
043ea469954e7c41e75856f8774fc8ea
-
SHA1
f6e568e017a803022f0a8462e671dd38373c29ab
-
SHA256
ad78d10e45c74a95a12646d3786f7a49ad62dbe6dd89e3d662ddf64f31e62d69
-
SHA512
474285a9e0605d0f89b5098d985c75ef5d43815231d2587441554375e10a23a49253fe531754e4947d466e4acd4d268e2220077a8d3dbff3dbaacb934e027d0a
-
SSDEEP
1536:hGXiwhcc0pitAjPh5efO/7sq/KMAFwtEbY:3Qcq2DefOzsq/KMAFFY
Malware Config
Signatures
Files
-
ad78d10e45c74a95a12646d3786f7a49ad62dbe6dd89e3d662ddf64f31e62d69.dll windows x86
89907083f2ce29521b57652ccbae1ce7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
lstrcpyA
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
SetLastError
DeleteFileA
Sleep
lstrlenA
GetLastError
WaitForSingleObject
CreateThread
ReleaseMutex
SetErrorMode
MultiByteToWideChar
CreateMutexA
GetTickCount
SetUnhandledExceptionFilter
FreeConsole
MoveFileExA
MoveFileA
GetSystemDirectoryA
WriteFile
CreateProcessA
InterlockedExchange
LocalAlloc
RaiseException
user32
wsprintfA
iphlpapi
GetAdaptersInfo
shlwapi
SHDeleteKeyA
msvcrt
??1exception@@UAE@XZ
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
__CxxFrameHandler
_CxxThrowException
_except_handler3
strchr
strncat
wcstombs
rand
srand
time
strstr
free
malloc
atoi
_errno
_vsnprintf
memmove
memchr
toupper
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBD@Z
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ