Static task
static1
Behavioral task
behavioral1
Sample
f14ddd12a552e171074b1896aee8146115b36bdf594c4e9aa66ec1a097832c3e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f14ddd12a552e171074b1896aee8146115b36bdf594c4e9aa66ec1a097832c3e.dll
Resource
win10v2004-20220901-en
General
-
Target
f14ddd12a552e171074b1896aee8146115b36bdf594c4e9aa66ec1a097832c3e
-
Size
36KB
-
MD5
5185e71e5fcb4947c5ddf69af9bde9ec
-
SHA1
c1b3a62812fac249ba4650e0ffe67caade7e21a9
-
SHA256
f14ddd12a552e171074b1896aee8146115b36bdf594c4e9aa66ec1a097832c3e
-
SHA512
b57a9fc056fc0d3d0318825af5f875b2fa5a5b309d313de7b028731acad2a63a3ba9564e13c8a2490a61b5b1d807a17fb673c288a86c0ecbbfa59decde6a4dbb
-
SSDEEP
768:v6Dvo7/WtHVSriNbO9tv4FGwwkJZDFuaDBBQARQkSmKMenYXay:Ggz0NbiUBBQARVKMen
Malware Config
Signatures
Files
-
f14ddd12a552e171074b1896aee8146115b36bdf594c4e9aa66ec1a097832c3e.dll windows x86
094e15b7624ce74d1cfa4373f25ff814
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memcpy
memcmp
strstr
_snprintf
RtlZeroMemory
RtlUnwind
strlen
ws2_32
gethostname
kernel32
CreateFileA
IsBadReadPtr
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualProtectEx
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
GetTempFileNameA
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
ReadProcessMemory
Sleep
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
GetStartupInfoA
user32
EnumWindows
GetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
KillTimer
SetTimer
SetWindowLongA
CallNextHookEx
RegisterWindowMessageA
SendMessageA
UnhookWindowsHookEx
wsprintfA
CallWindowProcA
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ