Static task
static1
Behavioral task
behavioral1
Sample
add0320b4626b1baa0f2a9acb413836dd7caec27e3b7e16e52226fde951345d8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
add0320b4626b1baa0f2a9acb413836dd7caec27e3b7e16e52226fde951345d8.dll
Resource
win10v2004-20221111-en
General
-
Target
add0320b4626b1baa0f2a9acb413836dd7caec27e3b7e16e52226fde951345d8
-
Size
228KB
-
MD5
a24d45eb67a4d528d3520a801934ca83
-
SHA1
4be5b791edc340d66520ef4c9cf295120a7b8aeb
-
SHA256
add0320b4626b1baa0f2a9acb413836dd7caec27e3b7e16e52226fde951345d8
-
SHA512
b0c4c0fdc8304c5eb95a146742507c296323c7b07f53d8831c24a6e8f7f5589675615894bb58b266678752d6bd260f18a5736e7fc86442e31d12b7c7b6912881
-
SSDEEP
3072:K9xtXlp19IE85zw4vlqgc27o5ahYRFnGgw7+w8NhADWYmiHgq0FCiHGT:ktXJ9IE85rlmVahYjwn8N6DWYmogrk9
Malware Config
Signatures
Files
-
add0320b4626b1baa0f2a9acb413836dd7caec27e3b7e16e52226fde951345d8.dll windows x86
f7f04c608c391298dc15cf5016652177
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord6197
ord2859
ord6880
ord941
ord926
ord665
ord354
ord4129
ord1168
ord2297
ord2363
ord2370
ord2302
ord6334
ord3499
ord2515
ord355
ord4710
ord3507
ord5773
ord6385
ord1979
ord5442
ord3318
ord5186
ord551
ord548
ord668
ord1980
ord3319
ord6358
ord3181
ord4058
ord2781
ord2770
ord356
ord801
ord541
ord6403
ord6929
ord6927
ord2763
ord3522
ord939
ord561
ord815
ord5861
ord654
ord6663
ord341
ord798
ord533
ord4278
ord6662
ord1997
ord5465
ord5194
ord536
ord3324
ord3797
ord3874
ord2860
ord1641
ord2122
ord1088
ord5875
ord2864
ord3089
ord800
ord4275
ord2414
ord567
ord556
ord818
ord795
ord809
ord3721
ord4424
ord1776
ord6055
ord3619
ord3626
ord3663
ord3402
ord5290
ord2379
ord4853
ord1105
ord4376
ord2764
ord3092
ord6215
ord6199
ord4234
ord324
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord4998
ord5265
ord6467
ord2514
ord641
ord924
ord6876
ord6877
ord6282
ord6283
ord860
ord535
ord6143
ord6140
ord4204
ord5710
ord6883
ord5858
ord858
ord4277
ord2915
ord5572
ord537
ord823
ord825
ord2614
ord540
ord2818
ord1200
ord3178
ord269
ord1116
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
msvcrt
atoi
fopen
fread
fclose
strncat
calloc
_stricmp
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
strncpy
atol
tolower
islower
ftell
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
vsprintf
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strdup
isxdigit
_CIpow
isdigit
_mbsstr
strstr
_CxxThrowException
free
malloc
_mbscmp
_mbsicmp
toupper
__CxxFrameHandler
memmove
sprintf
printf
strtok
_itoa
kernel32
FindResourceA
SizeofResource
LoadResource
LockResource
FlushFileBuffers
GetTempPathA
GetTempFileNameA
CopyFileA
GetTickCount
DeleteFileA
GetSystemTime
GetLocalTime
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcatA
WinExec
lstrcpyA
CreateDirectoryA
Sleep
GetShortPathNameA
lstrlenA
GetFileAttributesA
GetModuleFileNameA
CreateNamedPipeA
GetCurrentProcess
TerminateProcess
CreateProcessA
ConnectNamedPipe
WriteFile
DisconnectNamedPipe
ReadFile
GetDriveTypeA
CreateEventA
ResetEvent
WaitForSingleObject
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
OutputDebugStringA
GetVolumeInformationA
LocalFree
LocalAlloc
GetWindowsDirectoryA
user32
wsprintfA
LoadCursorA
CopyIcon
GetWindowRect
GetDC
ReleaseDC
InflateRect
InvalidateRect
IsWindow
SetWindowLongA
SetCursor
GetClientRect
PtInRect
ShowWindow
GetWindowThreadProcessId
GetWindowTextA
KillTimer
SendMessageA
SetTimer
PostMessageA
BringWindowToTop
EnumChildWindows
EnableWindow
GetSysColor
MessageBeep
GetParent
SetCapture
RedrawWindow
ReleaseCapture
gdi32
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
GetStockObject
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcp60
??0Init@ios_base@std@@QAE@XZ
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
libeay32
ord129
ord2831
ord3379
ord3395
ord3672
ord110
ord2929
ord2877
ord2724
ord161
ord3360
ord252
ord2885
ord1001
ord150
ord111
ord269
ord2630
ord3724
ord268
ord3422
ord3512
ord3663
ord3682
ord123
ord2611
ord2924
ord118
ord3575
ord3455
ord120
ord2936
wininet
InternetOpenA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
zlibwapi
ord80
ord81
ord84
ord82
ord83
ord21
ord19
ord20
curllib
curl_formadd
curl_easy_perform
curl_easy_cleanup
curl_easy_setopt
curl_easy_init
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ