CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
c35e7b5623c55cb1c0865def9af8d4739d7e41d22732efee9364e6f5ab2cb998.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c35e7b5623c55cb1c0865def9af8d4739d7e41d22732efee9364e6f5ab2cb998.dll
Resource
win10v2004-20220812-en
General
-
Target
c35e7b5623c55cb1c0865def9af8d4739d7e41d22732efee9364e6f5ab2cb998
-
Size
80KB
-
MD5
6c68c37c0fa2941df608a1e0b35c319d
-
SHA1
7b4e005620bf217bb8925833759973c9807705c1
-
SHA256
c35e7b5623c55cb1c0865def9af8d4739d7e41d22732efee9364e6f5ab2cb998
-
SHA512
7ef28d2b415f2293a0055088fd6556e0eb4dbb23658b0de9ff4515bd41c2bc5e9a105d1ce30b85be9ce2636b2c4afb3c6303efcaadeaca426b51b8068095027b
-
SSDEEP
1536:bU/BlmbpQeswgY07BYhemYX+Ko19PWSSH9009TXcQuuoYjJ:bSBlIVngYKBYhehuKo19PJeG0hc
Malware Config
Signatures
Files
-
c35e7b5623c55cb1c0865def9af8d4739d7e41d22732efee9364e6f5ab2cb998.dll windows x86
e4285f3ef797df79fa192bcdcbd679fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AreFileApisANSI
CreateDirectoryW
WTSGetActiveConsoleSessionId
CreateSemaphoreA
GetExitCodeProcess
GetLocaleInfoW
WriteConsoleW
FindNextFileA
GetCurrencyFormatA
CopyFileExW
GlobalMemoryStatusEx
GetStringTypeExW
TerminateJobObject
MoveFileA
ReadConsoleInputA
CreateMailslotW
OpenProcess
GetFileAttributesA
ProcessIdToSessionId
ReplaceFileW
GetConsoleScreenBufferInfo
WriteProcessMemory
FreeConsole
lstrcpynA
ClearCommError
GetSystemDefaultUILanguage
ReadConsoleA
CreateMutexA
FlushViewOfFile
GetCompressedFileSizeW
ExpandEnvironmentStringsW
SetProcessShutdownParameters
IsDBCSLeadByteEx
DisconnectNamedPipe
WaitForSingleObjectEx
GetFullPathNameA
VerifyVersionInfoW
SetFilePointerEx
GetFileSize
VirtualAllocEx
BindIoCompletionCallback
ResumeThread
GlobalDeleteAtom
PeekConsoleInputW
GetProcessAffinityMask
HeapUnlock
ReleaseMutex
GetBinaryTypeW
GetVersionExA
FreeLibraryAndExitThread
ExitThread
CreateFileW
SetEnvironmentVariableA
GetCommState
GetDriveTypeW
GetProfileStringW
GetProfileIntW
EnumUILanguagesW
GetDateFormatA
FindResourceExW
SetFileAttributesA
CreateNamedPipeA
SearchPathA
GetModuleFileNameA
GetEnvironmentStrings
BeginUpdateResourceA
GetWindowsDirectoryW
FindVolumeMountPointClose
GetSystemPowerStatus
GetModuleFileNameW
GlobalFindAtomA
GetUserDefaultUILanguage
LoadResource
ReadFileEx
IsBadHugeWritePtr
VirtualQueryEx
DnsHostnameToComputerNameW
GetVersion
DuplicateHandle
GetComputerNameW
GetTempFileNameW
FindFirstFileA
GetProfileSectionA
GetDiskFreeSpaceA
InterlockedExchange
CreateProcessA
OpenEventA
InitializeCriticalSectionAndSpinCount
MapViewOfFile
LocalFree
SetLastError
GetModuleHandleA
LoadLibraryA
GetProcessHeap
lstrlenA
GetComputerNameA
GetVolumeInformationA
CreateFileMappingA
InterlockedIncrement
GlobalAlloc
Sleep
GetSystemDirectoryA
GetProcAddress
CreateDirectoryA
InterlockedCompareExchange
HeapAlloc
GetSystemTimeAsFileTime
VirtualProtect
CopyFileA
SetEvent
FindFirstVolumeW
user32
DrawTextA
GetLastActivePopup
SetDlgItemTextW
TranslateMessage
SetPropW
SendNotifyMessageW
WinHelpA
wsprintfW
EnableWindow
GetDCEx
IsCharAlphaW
GetUserObjectInformationW
SetWindowWord
BeginPaint
GetMenuItemInfoA
SetMenuItemBitmaps
LoadImageA
ScrollWindowEx
FindWindowA
ShowCaret
GetWindowLongW
ScrollWindow
CreateDialogParamA
SetParent
EqualRect
DestroyIcon
CloseDesktop
CreatePopupMenu
VkKeyScanA
DrawEdge
AdjustWindowRectEx
CharNextExA
LoadImageW
ReplyMessage
MessageBoxIndirectW
wsprintfA
CreateDialogParamW
BringWindowToTop
CharToOemA
CreateCursor
GetMenuItemInfoW
DialogBoxParamW
ShowWindow
GetDoubleClickTime
CharLowerA
SendNotifyMessageA
GetForegroundWindow
DrawIconEx
CharUpperBuffA
GetCursor
InsertMenuA
RegisterWindowMessageA
UpdateLayeredWindow
RemovePropW
wvsprintfW
SetMenuItemInfoW
GetMessageA
CallNextHookEx
SetTimer
GetClassNameA
DispatchMessageA
KillTimer
SetWindowsHookExA
OemToCharA
oleaut32
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocString
shlwapi
PathFileExistsA
StrToIntW
PathGetCharTypeA
PathFindNextComponentW
PathFindFileNameW
AssocQueryStringW
StrCmpNIA
PathAddExtensionW
UrlGetPartW
PathGetArgsW
StrStrIW
UrlIsW
PathIsRelativeW
SHCreateShellPalette
StrCatBuffW
PathIsNetworkPathW
PathAddBackslashW
StrDupA
PathFindFileNameA
PathCompactPathExW
StrStrA
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExA
SetSecurityInfo
RegCreateKeyExA
GetUserNameA
RegSetValueExA
SetNamedSecurityInfoA
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
RegQueryValueExA
LookupAccountNameA
RegOpenCurrentUser
EnumServicesStatusW
InitiateSystemShutdownW
RegRestoreKeyW
RegEnumKeyW
RegQueryValueExW
RegDisablePredefinedCache
CredReadW
CredDeleteW
CheckTokenMembership
OpenThreadToken
SetTokenInformation
CredGetSessionTypes
RegConnectRegistryA
RegUnLoadKeyA
GetTokenInformation
CredWriteW
GetUserNameW
RegReplaceKeyW
ElfRegisterEventSourceW
shell32
SHGetFolderPathAndSubDirW
SHBindToParent
SHBrowseForFolderA
SHGetFolderPathA
gdi32
PolyPolygon
GetBkMode
Ellipse
AnimatePalette
Pie
PolylineTo
StartDocW
GetTextMetricsW
CreateEllipticRgnIndirect
GetWinMetaFileBits
GetLayout
SetWorldTransform
PaintRgn
CreateScalableFontResourceA
Chord
CloseMetaFile
GetPolyFillMode
ResizePalette
CreateBitmap
GetEnhMetaFileHeader
PtInRegion
GetStockObject
SetMetaRgn
GetDIBits
GetCharWidthW
EnumFontFamiliesExA
GetTextExtentPointW
GetTextExtentPoint32A
EnumFontsA
CopyMetaFileA
SetBkColor
GetBrushOrgEx
ExtEscape
SetArcDirection
CreateDCW
PlayEnhMetaFile
EndPath
SwapBuffers
CreateHalftonePalette
GetViewportExtEx
CreateCompatibleDC
StretchBlt
BeginPath
CreateDCA
CreateDiscardableBitmap
PtVisible
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ