Control_RunDLL
entryPoint
Behavioral task
behavioral1
Sample
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8.dll
Resource
win10v2004-en-20220113
Target
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8
Size
340KB
MD5
6ef7c427280a283ebbd0736d0caafb1b
SHA1
f9fa49f868caf4da1b4a2e2a67d402b893bfa372
SHA256
c427a2ce4158cdf1f320a1033de204097c781475889b284f6815b6d6f4819ff8
SHA512
7d934e9878e270699895dfbea65dfdc95c93c1ab0c87ed805210430bf74266600a709e9e1b06b16ab409c7f1c7b3befb77a7b829e2c54df4f55d5a7396b1f6c9
SSDEEP
6144:AdLIP63SG00/rp3GAO3griAqM3H2IKon/sNJJC+mT+e9o+dIoh/R56:AdLIS3SE/7O3nM32IRn8JNkSoJ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CloseDesktop
CreateDesktopA
VariantChangeType
SysFreeString
VariantInit
VariantClear
SysAllocString
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
WSAGetLastError
htonl
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetFilePointerEx
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
CreateFileW
GetStringTypeW
GetCommandLineW
GetLocalTime
LocalAlloc
LocalFree
FormatMessageA
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryA
FileTimeToSystemTime
SystemTimeToFileTime
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
VirtualAlloc
VirtualFree
CreateFileA
GetFileSize
SetEndOfFile
SetFilePointer
WriteFile
CloseHandle
GetLastError
Sleep
GetCurrentProcess
CreateRemoteThread
GetTickCount64
VirtualAllocEx
WriteProcessMemory
GetModuleFileNameA
WTSGetActiveConsoleSessionId
QueryPerformanceCounter
WaitForSingleObjectEx
GetCurrentThread
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
MultiByteToWideChar
GetCPInfo
EncodePointer
DecodePointer
LCMapStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateThread
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
InterlockedFlushSList
RtlPcToFileHeader
RaiseException
RtlUnwindEx
ExitThread
GetModuleHandleExW
ExitProcess
GetACP
GetStdHandle
GetFileType
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
Control_RunDLL
entryPoint
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ