CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
7acb290144bb7ff321f8bdba8577b2229e9c4c63d6fbcc85ddac7f4e9dc172c0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7acb290144bb7ff321f8bdba8577b2229e9c4c63d6fbcc85ddac7f4e9dc172c0.dll
Resource
win10v2004-20220812-en
General
-
Target
7acb290144bb7ff321f8bdba8577b2229e9c4c63d6fbcc85ddac7f4e9dc172c0
-
Size
84KB
-
MD5
716a0d4b6ae1dfd88f491e9197198ef7
-
SHA1
4b0e8caa2caf347921318f319bc6ba0e89e907f9
-
SHA256
7acb290144bb7ff321f8bdba8577b2229e9c4c63d6fbcc85ddac7f4e9dc172c0
-
SHA512
fffbc452fd20b8ab50adebff3f9af9bf04c7f729879b4ad154ff3e10598aa6688dff2825159e27b27483d1e30466980d5ed1c1ec91a4f09127aa420b1346cbec
-
SSDEEP
1536:j1yCah2llB8tYG2HK15IiEedtPqGibaXpVF0GjSGjF:jx12tYQ1EEAODKUSUF
Malware Config
Signatures
Files
-
7acb290144bb7ff321f8bdba8577b2229e9c4c63d6fbcc85ddac7f4e9dc172c0.dll windows x86
80ea97dbac7071f7e556dfe6fd4fb936
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessShutdownParameters
GetModuleFileNameW
GetAtomNameW
GetSystemWow64DirectoryW
CreateTimerQueue
FlushViewOfFile
MoveFileExA
IsProcessorFeaturePresent
CreateConsoleScreenBuffer
GetVolumeInformationW
RegisterWaitForSingleObject
HeapSetInformation
FlushFileBuffers
IsWow64Process
FillConsoleOutputAttribute
GetCommModemStatus
CreateSemaphoreA
GetLogicalDriveStringsA
GetThreadLocale
SetEndOfFile
GetProcessVersion
MapViewOfFileEx
GetFileInformationByHandle
SetLocalTime
CompareStringA
GetVersion
WaitForMultipleObjects
DnsHostnameToComputerNameW
GetConsoleScreenBufferInfo
RtlMoveMemory
OpenFile
FindAtomA
Beep
FileTimeToLocalFileTime
GlobalFlags
GetFullPathNameA
SleepEx
FindNextChangeNotification
SetVolumeLabelW
GetEnvironmentVariableA
CreateThread
GetFileAttributesA
SetInformationJobObject
GetCommandLineA
SetErrorMode
lstrcmpW
GetConsoleMode
GetDiskFreeSpaceExW
MoveFileW
GetFileType
FindFirstChangeNotificationA
GetLargestConsoleWindowSize
ActivateActCtx
GetConsoleOutputCP
LCMapStringW
EnumResourceNamesA
WaitForMultipleObjectsEx
SetConsoleScreenBufferSize
GetVolumePathNameW
OpenSemaphoreW
LockFile
ReadConsoleA
SetConsoleTextAttribute
UnregisterWaitEx
GetEnvironmentStringsW
CopyFileW
OpenMutexW
GetProfileStringA
GetComputerNameW
ReadFileEx
SetCurrentDirectoryA
SystemTimeToTzSpecificLocalTime
SetConsoleWindowInfo
GlobalGetAtomNameW
RegisterWaitForSingleObjectEx
FindResourceExA
CreatePipe
FindNextVolumeMountPointW
GetSystemTime
GlobalHandle
GetSystemPowerStatus
GlobalMemoryStatus
GetFileTime
FlushConsoleInputBuffer
GetDateFormatW
WriteProcessMemory
OpenEventA
Sleep
VirtualQuery
LeaveCriticalSection
MapViewOfFile
CreateProcessA
InterlockedCompareExchange
InterlockedExchange
GetTickCount
ExitProcess
SetLastError
HeapFree
InitializeCriticalSectionAndSpinCount
WriteFile
InterlockedIncrement
lstrlenA
EnterCriticalSection
GetVolumeInformationA
GetProcAddress
FindFirstFileExW
LoadLibraryA
advapi32
CredReadDomainCredentialsW
RegUnLoadKeyA
RegOpenCurrentUser
GetNumberOfEventLogRecords
LogonUserA
DeregisterEventSource
RegisterServiceCtrlHandlerW
NotifyChangeEventLog
QueryServiceStatus
RegNotifyChangeKeyValue
IsTokenRestricted
ControlService
EnumServicesStatusW
OpenServiceW
SaferGetLevelInformation
CredFree
ElfReportEventW
RegRestoreKeyW
GetAclInformation
QueryServiceLockStatusA
OpenProcessToken
SaferCreateLevel
EnumServicesStatusA
GetSecurityDescriptorSacl
RegCreateKeyExA
SetNamedSecurityInfoA
RegDeleteValueA
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
OpenEventLogW
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ