Static task
static1
Behavioral task
behavioral1
Sample
f743192f87deb1aa0bc284edf586a8032d71c9fe716ece009db72238d1a48187.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f743192f87deb1aa0bc284edf586a8032d71c9fe716ece009db72238d1a48187.dll
Resource
win10v2004-20220812-en
General
-
Target
f743192f87deb1aa0bc284edf586a8032d71c9fe716ece009db72238d1a48187
-
Size
108KB
-
MD5
cf39f5d7e1f8c35f124023cb9ee0567e
-
SHA1
6ab24aa2e767e3915631d7a517fcf440f30f9056
-
SHA256
f743192f87deb1aa0bc284edf586a8032d71c9fe716ece009db72238d1a48187
-
SHA512
55b3c468b26012ce9770b36e441241f40cf4488736ac7ba4a9cd9bb44cc5b99b316569c4ae5772ac0d54572db938e2b5c0d3f1849bced07fb8357a3d4a354379
-
SSDEEP
1536:lFDUIYkK4cEui1gNNx0eW6QPB/4ZW1ck8zHhTduu+qjuk9WkD:7hYZ4z1sxtbjuUW
Malware Config
Signatures
Files
-
f743192f87deb1aa0bc284edf586a8032d71c9fe716ece009db72238d1a48187.dll windows x86
c2fd9a7e4e3c5959b2c674d135bcdd87
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFileEx
OpenFile
_lcreat
_lopen
_hread
_llseek
GetFileSize
lstrcmpA
GetProcAddress
Sleep
QueryPerformanceCounter
WriteFile
FreeLibrary
LoadLibraryA
GetLocalTime
SetFileTime
GetFileTime
SetFileAttributesA
GetFileAttributesA
FindClose
lstrcmpiA
FindFirstFileA
CreateThread
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
SetThreadPriority
GetDriveTypeA
GetLogicalDriveStringsA
CreateSemaphoreA
DeleteFileA
GetExitCodeThread
CopyFileA
CreateDirectoryA
GetCurrentProcessId
SetEndOfFile
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateThread
CloseHandle
SetFilePointer
GetModuleFileNameA
GetModuleHandleA
CreateFileA
ReadFile
VirtualProtect
FindNextFileA
GetLastError
SetSt
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
InterlockedDecrement
GetEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
advapi32
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptGenKey
CryptImportKey
CryptExportKey
GetUserNameA
shell32
SHGetSpecialFolderPathA
ws2_32
WSAStartup
WSACleanup
gethostname
bind
socket
gethostbyname
inet_ntoa
inet_addr
htons
connect
WSACreateEvent
WSAEventSelect
WSAEnumNetworkEvents
accept
shutdown
closesocket
recv
send
listen
iphlpapi
GetAdaptersInfo
shlwapi
StrToIntA
PathAppendA
PathFindFileNameA
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ