Static task
static1
Behavioral task
behavioral1
Sample
cda54cef40f457f19d1eca793ec1a402.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cda54cef40f457f19d1eca793ec1a402.dll
Resource
win10v2004-20230221-en
General
-
Target
cda54cef40f457f19d1eca793ec1a402.dll
-
Size
129KB
-
MD5
cda54cef40f457f19d1eca793ec1a402
-
SHA1
6d55c58ddf8f3847b9d308fd8bc99532c484fcea
-
SHA256
f5a9a64454862638addd6a0060dc877f3d54efe96a2908c1920815f756786530
-
SHA512
dc91c72166af8b43cfc510600b1455c7547abc774029ad31eebdf910d5e77eb6c05a19a2d8a475faf8ce99f4aeae43134213817576cbd5337ca8e2eef4017ded
-
SSDEEP
3072:FabK522aT2GEXM53lQbVwqoWebVEJGkbJYPlqdiQ8y8TUYOZf6g:cvEXYQbVwqoWebVEJRbMU85UYOZf6
Malware Config
Signatures
Files
-
cda54cef40f457f19d1eca793ec1a402.dll.dll windows x86
fd22c022cde6b9df9c56b4eeb4e4a2dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetLastError
DeviceIoControl
GetVersionExA
CloseHandle
VirtualQuery
Process32First
GetTickCount
IsBadReadPtr
OpenProcess
GetPrivateProfileIntA
Thread32First
GetVolumeInformationA
TerminateThread
Sleep
ReadProcessMemory
TerminateProcess
Thread32Next
FlushInstructionCache
SetPriorityClass
GetProcAddress
OpenThread
Process32Next
WritePrivateProfileStringA
GetModuleHandleA
VirtualProtect
CreateToolhelp32Snapshot
GetCurrentProcessId
CreateThread
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
CreateFileA
IsProcessorFeaturePresent
user32
ScreenToClient
GetCursorPos
SetRect
GetForegroundWindow
FindWindowA
msvcp100
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Xlength_error@std@@YAXPBD@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?id@?$codecvt@DDH@std@@2V0locale@2@A
?_Getcat@?$codecvt@DDH@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?unshift@?$codecvt@DDH@std@@QBEHAAHPAD1AAPAD@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
?out@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
?in@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Xout_of_range@std@@YAXPBD@Z
?always_noconv@codecvt_base@std@@QBE_NXZ
?_Decref@facet@locale@std@@QAEPAV123@XZ
?_Incref@facet@locale@std@@QAEXXZ
??Bid@locale@std@@QAEIXZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
?_BADOFF@std@@3_JB
msvcr100
isalnum
vsprintf_s
tolower
isprint
strncpy
fputc
??1bad_cast@std@@UAE@XZ
??0bad_cast@std@@QAE@PBD@Z
??0bad_cast@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
memmove
_unlock_file
malloc
fgetpos
memchr
_fseeki64
fflush
fgetc
fsetpos
setvbuf
_lock_file
??_V@YAXPAX@Z
clock
rand
strcpy_s
_vsnprintf
srand
??3@YAXPAX@Z
memcpy_s
fwrite
_localtime64
fclose
_time64
??2@YAPAXI@Z
__CxxFrameHandler3
_unlock
__dllonexit
_lock
_onexit
_stricmp
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_CxxThrowException
_CIcos
_CIsin
_CIsqrt
memcpy
memset
_getpid
sprintf
free
isspace
ungetc
urlmon
ObtainUserAgentString
wininet
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetConnectA
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ