Static task
static1
Behavioral task
behavioral1
Sample
d12d99b16fc4c95137c1923105062920702e25b57b60c5baa16b1f3ba35c88b9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d12d99b16fc4c95137c1923105062920702e25b57b60c5baa16b1f3ba35c88b9.dll
Resource
win10v2004-20221111-en
General
-
Target
d12d99b16fc4c95137c1923105062920702e25b57b60c5baa16b1f3ba35c88b9
-
Size
44KB
-
MD5
e28373fec5fb37bdb5f9b3eafb5de662
-
SHA1
abff906ff4145cb650225841cb6ab58d7e04c833
-
SHA256
d12d99b16fc4c95137c1923105062920702e25b57b60c5baa16b1f3ba35c88b9
-
SHA512
464187ada46f02f4e859ca590f118366c2586bbb01045b7302dbbe8d9f4fd1bb251c2efa66377120d5955186efc0164805a72980a31bb2804315ae4d8375fc2a
-
SSDEEP
768:cVV7m2JvWSRAHYKoGyYQQNBeJXlK51GBM2hBBQARQkeElA/:2VXRAnGBM2hBBQAR9C
Malware Config
Signatures
Files
-
d12d99b16fc4c95137c1923105062920702e25b57b60c5baa16b1f3ba35c88b9.dll windows x86
4255c8de144241b4abdcfb7febca4902
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
gethostname
ntdll
sscanf
RtlNumberGenericTableElements
RtlInsertElementGenericTable
RtlInitializeGenericTable
RtlGetElementGenericTable
RtlDeleteElementGenericTable
memcpy
_snprintf
RtlZeroMemory
RtlUnwind
memcmp
strlen
strstr
kernel32
lstrcpyA
UnmapViewOfFile
MoveFileExA
MapViewOfFile
GetTempPathA
GetTempFileNameA
GetSystemDirectoryA
GetStartupInfoA
GetLastError
GetExitCodeThread
DeleteFileA
CreateProcessA
IsBadReadPtr
lstrcpynA
WriteFile
VirtualProtectEx
VirtualFree
GlobalAlloc
GlobalFree
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
CreateFileMappingA
lstrlenA
GetPrivateProfileStringA
WideCharToMultiByte
CreateFileA
GetFileSize
ReadFile
VirtualAlloc
user32
wsprintfA
GetWindowThreadProcessId
KillTimer
RegisterWindowMessageA
SendMessageA
SetTimer
UnhookWindowsHookEx
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 882B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ