Static task
static1
Behavioral task
behavioral1
Sample
991335456a8edca115159e9a538d077e3a773df3dad63613359107c70545bea1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
991335456a8edca115159e9a538d077e3a773df3dad63613359107c70545bea1.dll
Resource
win10v2004-20220812-en
General
-
Target
991335456a8edca115159e9a538d077e3a773df3dad63613359107c70545bea1
-
Size
248KB
-
MD5
cfa8fdc68a3b706bae07814e4513bd3e
-
SHA1
adf7576e4ebbc214aadfeecc931ca29406d5ca7d
-
SHA256
991335456a8edca115159e9a538d077e3a773df3dad63613359107c70545bea1
-
SHA512
152e9f399cd8cc4df1e7ac0438137cffa1ab670eedaeac5bc4fb62d69a51d43017ab7ffddf9d6ea935cb0be2423e3e52ef642295a216238f79848a606e5530b9
-
SSDEEP
768:1ZSLrEUYB76CdhLnrL8z0x96ba4zPQgrO9R65BBQARQk4HlW+:YQUDQyO9R65BBQARI1
Malware Config
Signatures
Files
-
991335456a8edca115159e9a538d077e3a773df3dad63613359107c70545bea1.dll windows x86
85e3c7a6fd1be887d2e071599070d312
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strstr
memcpy
memcmp
_snprintf
RtlZeroMemory
RtlUnwind
strlen
ws2_32
closesocket
gethostname
kernel32
lstrcmpA
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
GetTempFileNameA
GetSystemDirectoryA
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
CloseHandle
CreateThread
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
IsBadReadPtr
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetStartupInfoA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
VirtualAlloc
user32
wsprintfA
GetWindowThreadProcessId
KillTimer
RegisterWindowMessageA
SendMessageA
SetTimer
UnhookWindowsHookEx
Sections
.text Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ