Static task
static1
Behavioral task
behavioral1
Sample
judpotp.dll
Resource
win7-20220414-en
General
-
Target
judpotp.rar
-
Size
311KB
-
MD5
8e5596083fd4c3134204e905f7f66325
-
SHA1
6902210f93d3a940571cc860c4563cd4be14edb9
-
SHA256
8110e38afd33797465ab43841b1c54abff7a25acc30fa27c2623966750d34737
-
SHA512
e7084948b9f9bcb28f7c85a2812825d8012327bcfb5310f5759aebd585504624682187f9a6af86206295bfb4f1a9a178dc9322218b2e0a72e2cb3b8fcfb370e5
-
SSDEEP
6144:/HdO040SSrnmrwc4oU2FmrEaoGAC+Y5H2V3B918juwUX:vdO02Srnh0qEJC+Y218jdU
Malware Config
Signatures
Files
-
judpotp.rar.dll windows x86
cfee0704875f61e2fce4498511a79bc8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LoadLibraryA
GetProcAddress
GetModuleHandleW
QueryPerformanceCounter
GetCommandLineW
ExpandEnvironmentStringsW
CreateEventW
CreateThread
WaitForSingleObject
InterlockedIncrement
MultiByteToWideChar
LoadLibraryW
FormatMessageW
GetTickCount
Sleep
OpenEventW
SetEvent
CloseHandle
GetStdHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatW
LocalAlloc
GetTimeFormatW
LocalFree
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
GetFileType
WriteFile
WideCharToMultiByte
WriteConsoleW
GetTimeZoneInformation
FreeLibrary
GetShortPathNameW
CreateProcessA
GlobalUnWire
lstrlenA
MoveFileA
MoveFileWithProgressA
SetCommTimeouts
GetConsoleAliasW
SetConsoleCtrlHandler
GetSystemInfo
GetSystemPowerStatus
GetVolumePathNameW
SetComputerNameA
ReadConsoleOutputCharacterW
GetDriveTypeW
FindFirstVolumeW
DeleteFileW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
GetFileInformationByHandle
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpyW
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVolumeNameForVolumeMountPointW
ReleaseMutex
OpenMutexW
CreateMutexW
FindFirstFileW
FindNextFileW
FindClose
HeapFree
ReadFile
lstrcatW
IsBadWritePtr
GetProcessHeap
HeapAlloc
lstrcmpiW
lstrlenW
CreateFileA
FileTimeToDosDateTime
GetFileAttributesA
SetLastError
DeviceIoControl
user32
LoadCursorA
LoadStringW
DialogBoxParamW
EndDialog
GetDlgItem
EnableWindow
SendDlgItemMessageW
wsprintfW
CharUpperW
wvsprintfA
IsCharUpperW
UnionRect
RegisterClassW
EnumPropsExW
IsHungAppWindow
RegisterClassA
SetPropA
MessageBoxA
CharLowerA
AdjustWindowRect
LoadMenuIndirectW
GetTopWindow
DdePostAdvise
WaitForInputIdle
SetWindowRgn
GetMenuItemRect
RemoveMenu
RegisterWindowMessageW
IsWindowUnicode
ChangeMenuW
MessageBoxIndirectW
MapVirtualKeyExW
GetUserObjectInformationW
ReleaseDC
GetWindowLongW
SetCaretPos
GetKeyboardLayoutNameA
SetMenu
CopyAcceleratorTableA
GetKBCodePage
SwitchDesktop
gdi32
GetTextCharacterExtra
RealizePalette
InvertRgn
GetStretchBltMode
RoundRect
RemoveFontResourceTracking
GetTextExtentExPointW
EngStretchBlt
GetDeviceCaps
GetTextExtentExPointWPri
GetCharacterPlacementA
GetCharABCWidthsFloatA
SetDCPenColor
SetGraphicsMode
SetWorldTransform
GetOutlineTextMetricsW
XLATEOBJ_piVector
CLIPOBJ_ppoGetPath
SetRectRgn
GetRgnBox
GdiGetDC
GdiConvertAndCheckDC
CopyEnhMetaFileA
GetEnhMetaFileA
EngCreateSemaphore
CreateFontW
GetTextExtentPoint32W
EngComputeGlyphSet
SetTextColor
ModifyWorldTransform
GdiSetLastError
GdiGetLocalDC
GetTextFaceW
CreateFontIndirectExA
SetDIBits
BitBlt
GdiDescribePixelFormat
PolyTextOutW
EngDeleteSemaphore
GdiCleanCacheDC
advapi32
RegOpenKeyA
StartServiceCtrlDispatcherW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegConnectRegistryW
RegOpenKeyW
RegSetValueExW
OpenSCManagerW
OpenServiceW
ControlService
RegCloseKey
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerExW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
RegEnumKeyW
CloseEventLog
ReadEventLogW
OpenEventLogW
FreeSid
shell32
CommandLineToArgvW
SHPathPrepareForWriteW
SHAppBarMessage
FindExecutableW
SHGetDiskFreeSpaceA
SHGetFileInfoA
SHIsFileAvailableOffline
SHBrowseForFolderA
SHPathPrepareForWriteA
DragQueryPoint
SHGetDataFromIDListW
ShellExecuteExW
ShellExecuteEx
SHFileOperationW
ShellExecuteExA
ShellExecuteA
DragQueryFileW
SHGetFolderLocation
ExtractIconEx
shlwapi
StrRChrA
StrChrA
StrRChrW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 225B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2 Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text4 Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ