ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
a5ed2d8499ccc4c4254806b6590150fed89a3f3e6531bebedb139e486cf1c47e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5ed2d8499ccc4c4254806b6590150fed89a3f3e6531bebedb139e486cf1c47e.dll
Resource
win10v2004-20221111-en
General
-
Target
a5ed2d8499ccc4c4254806b6590150fed89a3f3e6531bebedb139e486cf1c47e
-
Size
100KB
-
MD5
f7a9953a1e6dfe6ac112f4026a1ffae0
-
SHA1
84a8bd367bbff09c787013fe3167410cda8dacd7
-
SHA256
a5ed2d8499ccc4c4254806b6590150fed89a3f3e6531bebedb139e486cf1c47e
-
SHA512
6d2aa5fe62c37e06db82ad4a49cb9606d9fecc6fed5e7f882d5dbbbd61ea5b88f45aa46a9d8da6d16d6e43d5a7078ed4ac32f7be730bb53cbb150422d9917e32
-
SSDEEP
3072:oJlAkzYPbTQj5mg18YtH5YKrbIcvMpfcfccTfofcfccTfofcfccTfofcfccTU+TW:oREodFPuWlHJx7zS
Malware Config
Signatures
Files
-
a5ed2d8499ccc4c4254806b6590150fed89a3f3e6531bebedb139e486cf1c47e.dll windows x86
924ce80c84f960c6e646bfe772caa4a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
msvcrt
_adjust_fdiv
_initterm
calloc
_strcmpi
wcstombs
realloc
strncat
_mbscmp
printf
time
srand
rand
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
_strnicmp
_beginthreadex
winmm
waveOutGetNumDevs
waveOutOpen
waveOutUnprepareHeader
waveOutReset
waveInClose
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
waveOutClose
ws2_32
gethostbyname
connect
htons
WSAStartup
WSACleanup
WSAIoctl
setsockopt
closesocket
ntohs
recv
select
send
inet_addr
sendto
socket
WSASocketA
inet_ntoa
htonl
getsockname
gethostname
mfc42
ord940
ord4129
ord5710
ord537
ord926
ord924
ord922
ord540
ord535
ord858
ord6663
ord860
ord4278
ord800
ord2818
ord939
ord6877
kernel32
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
Process32Next
LocalSize
FreeConsole
SleepEx
SetUnhandledExceptionFilter
CreateMutexA
OpenEventA
Process32First
SetErrorMode
ReleaseMutex
GlobalMemoryStatus
WaitForMultipleObjects
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
UnmapViewOfFile
HeapFree
CreateFileMappingA
MapViewOfFile
GetLocalTime
MoveFileExA
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
ExitThread
GetCurrentProcessId
GetTickCount
HeapAlloc
GetProcessHeap
GlobalAlloc
user32
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
OpenDesktopA
SystemParametersInfoA
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
MessageBoxA
ExitWindowsEx
CharNextA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
GetDesktopWindow
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorInfo
GetCursorPos
ReleaseDC
keybd_event
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegisterServiceCtrlHandlerA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
imm32
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringA
wininet
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICClose
ICSeqCompressFrameEnd
ICCompressorFree
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ