Static task
static1
Behavioral task
behavioral1
Sample
a2c645ffb1e194b29d59d4074051101e144c1e01a02d3572e0c4a581475abf3c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2c645ffb1e194b29d59d4074051101e144c1e01a02d3572e0c4a581475abf3c.dll
Resource
win10v2004-20220812-en
General
-
Target
a2c645ffb1e194b29d59d4074051101e144c1e01a02d3572e0c4a581475abf3c
-
Size
13KB
-
MD5
c4ed7550e8f4b5f6bcf476a050510df2
-
SHA1
34488f6ab701be86aa0a97705d8c13356f7ab04d
-
SHA256
a2c645ffb1e194b29d59d4074051101e144c1e01a02d3572e0c4a581475abf3c
-
SHA512
e9ca785f22c9c4ce6a9128544e0443fbd33fa9d42245774dcd311072f7c07686167f477dd033ec580d699a807b2ca400ac5465794dcec2995fe3bc3e0d732495
-
SSDEEP
192:uShBTH4QGI7UIc2xJqLA6PjGn0YgX2T3im0/cy:fJGnIBErPyvgXw30
Malware Config
Signatures
Files
-
a2c645ffb1e194b29d59d4074051101e144c1e01a02d3572e0c4a581475abf3c.dll windows x86
453cd05707f2bfbbaf6a5c7ea8038fc1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
GlobalFree
GlobalLock
GlobalAlloc
GetCurrentProcess
VirtualProtectEx
CloseHandle
GetComputerNameA
CreateThread
WriteProcessMemory
GetModuleFileNameA
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ