Static task
static1
Behavioral task
behavioral1
Sample
17c59f3f535c81a1007b7e307b10dd91ddb2154b398d4ed389bcfda26d1633f7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
17c59f3f535c81a1007b7e307b10dd91ddb2154b398d4ed389bcfda26d1633f7.dll
Resource
win10v2004-20221111-en
General
-
Target
17c59f3f535c81a1007b7e307b10dd91ddb2154b398d4ed389bcfda26d1633f7
-
Size
88KB
-
MD5
d98e8bdd9de4dbcbcc6c8e5dd607a3f0
-
SHA1
8867cb2d1b45bfba35149d99a263f9c6217c6be9
-
SHA256
17c59f3f535c81a1007b7e307b10dd91ddb2154b398d4ed389bcfda26d1633f7
-
SHA512
ef40166b51a4705ebe4b0271a72507a0aa54e5d898b1bffe0589ddcdcea9f5b134d30514df4408cf4178b7c148bfc2cee6b30ac4a915b650b084a81b1d7a3f84
-
SSDEEP
1536:NVlHLrengqZu1qe1FyoP7NZnW3Ifl//t9wI54EQqyJW03ILM4vdqW3K:NLHL1ku1qe1gsDnW3IFlAWxMYT
Malware Config
Signatures
Files
-
17c59f3f535c81a1007b7e307b10dd91ddb2154b398d4ed389bcfda26d1633f7.dll windows x86
810863c9671e54751220d1dd11e51e61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscmp
malloc
free
atoi
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
memset
wcsrchr
strstr
memcpy
_except_handler3
shlwapi
PathFileExistsA
SHSetValueA
SHGetValueA
SHDeleteValueA
SHDeleteKeyA
psapi
GetModuleInformation
GetModuleFileNameExA
ws2_32
inet_ntoa
htons
WSAEventSelect
shutdown
gethostbyname
send
WSAStartup
gethostname
WSAGetLastError
WSARecvFrom
setsockopt
sendto
WSACleanup
bind
socket
WSACreateEvent
closesocket
inet_addr
htonl
recv
connect
iphlpapi
GetNetworkParams
GetAdaptersInfo
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
gdiplus
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
kernel32
lstrlenW
DisconnectNamedPipe
FlushFileBuffers
ExitThread
OpenThread
GetCurrentThreadId
GetCurrentProcessId
GetSystemTime
TerminateThread
CreateNamedPipeA
ConnectNamedPipe
IsBadReadPtr
GetVolumeInformationA
OpenEventA
ReadProcessMemory
MapViewOfFile
lstrcpynA
WriteProcessMemory
OpenFileMappingA
WinExec
VirtualAllocEx
ExitProcess
CreateFileA
lstrlenA
VirtualQuery
SetEndOfFile
WaitForSingleObject
GetTickCount
VirtualFree
WriteFile
OpenProcess
Sleep
CreateEventA
CreateProcessA
ReadFile
GetSystemDirectoryA
lstrcatA
MultiByteToWideChar
GetLastError
lstrcmpiA
GetProcAddress
LoadLibraryA
SetNamedPipeHandleState
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
VirtualProtect
GetVersionExA
CloseHandle
GetTempPathA
lstrcpyW
DeleteFileA
lstrcpyA
GetFileSize
FindResourceA
FreeResource
SetEvent
UnmapViewOfFile
FreeLibrary
LoadResource
GetCurrentProcess
Process32First
GetSystemTimeAsFileTime
SetFileTime
Thread32First
SizeofResource
Thread32Next
VirtualAlloc
CopyFileA
Process32Next
CreateFileMappingA
LockResource
CreateToolhelp32Snapshot
GetFileTime
LocalFree
WideCharToMultiByte
ResetEvent
DeviceIoControl
CreateThread
lstrcmpA
VirtualProtectEx
user32
PostThreadMessageA
ReleaseDC
GetDC
GetWindowTextA
GetWindow
PostMessageA
wsprintfW
FindWindowA
wsprintfA
gdi32
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
GetSecurityInfo
RegCloseKey
OpenProcessToken
ConvertSidToStringSidA
SetEntriesInAclA
SetNamedSecurityInfoA
GetTokenInformation
LookupPrivilegeValueA
OpenServiceA
CloseServiceHandle
RegQueryValueExA
CreateServiceA
StartServiceA
QueryServiceStatus
OpenSCManagerA
ControlService
DuplicateTokenEx
CreateProcessAsUserA
RegNotifyChangeKeyValue
RegSaveKeyA
RegOpenKeyExA
RegRestoreKeyA
GetNamedSecurityInfoA
AdjustTokenPrivileges
BuildExplicitAccessWithNameA
IsValidSid
SetSecurityInfo
RegOpenKeyA
shell32
ShellExecuteA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE