AppPathCmds
Static task
static1
Behavioral task
behavioral1
Sample
f5ec9ff491ab85818bc75bcbfc8e9f1c62a5a9c84ac868d770e812a9be460656.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f5ec9ff491ab85818bc75bcbfc8e9f1c62a5a9c84ac868d770e812a9be460656.dll
Resource
win10v2004-20220812-en
General
-
Target
f5ec9ff491ab85818bc75bcbfc8e9f1c62a5a9c84ac868d770e812a9be460656
-
Size
148KB
-
MD5
532026c461714bb3d15cde1994daf8cf
-
SHA1
34f8c5c7c25fca0d1b0011ef01ae06622853ebc4
-
SHA256
f5ec9ff491ab85818bc75bcbfc8e9f1c62a5a9c84ac868d770e812a9be460656
-
SHA512
61f0d776c03b04845ff2f2dc33bdb79855b86978b1deb7b40e42fd35cd60ea56dafe7581a6acf740e785f2723c7cc6ed6a3292a416c4e12092f8f694059406ab
-
SSDEEP
3072:txqs3CoBteO7/ACoZGN3CNlfes8yJIpx4Vx:3CWz/ACofNlvIpxW
Malware Config
Signatures
Files
-
f5ec9ff491ab85818bc75bcbfc8e9f1c62a5a9c84ac868d770e812a9be460656.dll windows x86
54b6de8abccf0d45bcf9a9b9b32e8c5b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
LeaveCriticalSection
EnterCriticalSection
InterlockedCompareExchange
WriteProcessMemory
GlobalFree
ExitProcess
UnmapViewOfFile
TerminateProcess
CreateFileMappingA
CopyFileA
GetModuleFileNameA
GetProcessHeap
CreateEventA
CreateProcessA
GetModuleHandleA
ReadProcessMemory
CreateFileA
OpenFileMappingA
WriteFile
CreateDirectoryA
InterlockedIncrement
GetTickCount
CreateMutexW
Sleep
GetCurrentProcess
GetProcAddress
HeapFree
GetCommandLineA
GlobalAlloc
GetLastError
GetComputerNameA
InterlockedDecrement
HeapAlloc
OpenEventA
SetLastError
MapViewOfFile
LocalFree
CloseHandle
WaitForSingleObject
LoadLibraryA
ole32
CoInitialize
OleSetContainedObject
CoTaskMemAlloc
OleCreate
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoCreateGuid
user32
KillTimer
CreateWindowExA
GetWindow
SetTimer
ScreenToClient
GetParent
GetMessageA
GetCursorPos
TranslateMessage
DefWindowProcA
SetWindowsHookExA
GetWindowLongA
ClientToScreen
SetWindowLongA
PostQuitMessage
DispatchMessageA
DestroyWindow
FindWindowA
GetWindowThreadProcessId
UnhookWindowsHookEx
PeekMessageA
GetSystemMetrics
GetClassNameA
SendMessageA
RegisterWindowMessageA
oleaut32
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteValueA
RegOpenKeyExA
GetUserNameA
RegCreateKeyExA
OpenProcessToken
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
DuplicateTokenEx
RegCloseKey
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 937B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yjfmvhx Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ