Behavioral task
behavioral1
Sample
d873fe143f0f3b14c6540e603f6a0c1adedd410268ba677d8516b290ebecdf22.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d873fe143f0f3b14c6540e603f6a0c1adedd410268ba677d8516b290ebecdf22.dll
Resource
win10v2004-20221111-en
General
-
Target
d873fe143f0f3b14c6540e603f6a0c1adedd410268ba677d8516b290ebecdf22
-
Size
218KB
-
MD5
4ea64e870b4cfccd300f4fbbf89b4dd6
-
SHA1
8bd9d1b04f811765cd316a8ea3e75a12345baf84
-
SHA256
d873fe143f0f3b14c6540e603f6a0c1adedd410268ba677d8516b290ebecdf22
-
SHA512
83a7a160dc8ac3910e8dacff0e97af547005b16d2cdaff81bcf1cade607dad86c695288a38eafa0ece3e87c75b7529ec7ce70fe9fb17f016679d283a1ed03efc
-
SSDEEP
6144:XY+UeYJ6E/smDukMgurxJ4Q1f4SL9UmM7bg:XY+UrEQDuVTrxnl4SJe7bg
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d873fe143f0f3b14c6540e603f6a0c1adedd410268ba677d8516b290ebecdf22.dll windows x86
fbcabe07de80bc1ea042211bd802342e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
memset
memcpy
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
wininet
InternetOpenUrlA
InternetReadFileExA
InternetSetStatusCallback
HttpQueryInfoA
InternetOpenA
InternetCloseHandle
ws2_32
freeaddrinfo
WSACleanup
getaddrinfo
htons
send
closesocket
WSAStartup
WSAAddressToStringA
inet_addr
connect
socket
iphlpapi
GetAdaptersInfo
kernel32
SetEvent
CreateEventA
GetLastError
MapViewOfFile
UnmapViewOfFile
OpenProcess
DeviceIoControl
GetSystemDirectoryA
lstrcatA
CreateThread
WinExec
CreateFileMappingA
ExitThread
lstrcpyA
CreateFileA
FindResourceA
FreeResource
lstrlenA
FreeLibrary
Process32First
WriteFile
Sleep
SizeofResource
ReadFile
lstrcmpiA
GetProcAddress
Process32Next
LockResource
GetModuleHandleA
LoadLibraryExA
CreateToolhelp32Snapshot
CloseHandle
GetSystemTime
DeleteFileA
WaitForSingleObject
ExitProcess
GetFileSize
VirtualQuery
GetWindowsDirectoryA
MultiByteToWideChar
LoadLibraryA
GetModuleFileNameA
GetFileTime
GetCurrentThreadId
GetTempPathA
CopyFileA
user32
OpenDesktopA
OpenWindowStationA
GetInputState
wsprintfA
PostThreadMessageA
GetMessageA
SetThreadDesktop
SetProcessWindowStation
advapi32
RegCreateKeyExA
QueryServiceStatus
OpenServiceA
CloseServiceHandle
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
OpenProcessToken
CreateProcessAsUserA
RegCloseKey
ControlService
OpenSCManagerA
RegOpenKeyExA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ