Static task
static1
Behavioral task
behavioral1
Sample
9dc5ceb6b36ee899ff36aacceaffc7885ad8e95aec8086bd73dbc2043293d443.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9dc5ceb6b36ee899ff36aacceaffc7885ad8e95aec8086bd73dbc2043293d443.dll
Resource
win10v2004-20220901-en
General
-
Target
9dc5ceb6b36ee899ff36aacceaffc7885ad8e95aec8086bd73dbc2043293d443
-
Size
40KB
-
MD5
5152f3f5f833628febbb4c48d5c9c921
-
SHA1
8966a206e3f2a5979e0c63cc85cfb5e079e17df6
-
SHA256
9dc5ceb6b36ee899ff36aacceaffc7885ad8e95aec8086bd73dbc2043293d443
-
SHA512
421c857f9ac00bde5f251024ded72bef06b1ce7047e95be49f0f07eb4739f321d53407c32d854eb0e6738e1e57171593d5e8519b378ef0b39ea23b0f4cb147e7
-
SSDEEP
768:kDuqQeb8oAyPiK7r21eDfwOL59chMUe6spA1BBQARQk6XPiGA:kaqQeb8yKIYne6spA1BBQARL
Malware Config
Signatures
Files
-
9dc5ceb6b36ee899ff36aacceaffc7885ad8e95aec8086bd73dbc2043293d443.dll windows x86
8d61c5e81dccec6ee766c68552b3c9e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
gethostname
ntdll
strstr
_snprintf
RtlZeroMemory
RtlUnwind
memcmp
memcpy
strlen
kernel32
CreateFileA
IsBadReadPtr
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
GetCommandLineA
lstrcpynA
GetTempFileNameA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
GetStartupInfoA
GetSystemDirectoryA
user32
GetWindowThreadProcessId
KillTimer
CallNextHookEx
RegisterWindowMessageA
SendMessageA
SetTimer
UnhookWindowsHookEx
GetWindowTextA
EnumWindows
wsprintfA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 820B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ