kbdobjdrm
Static task
static1
Behavioral task
behavioral1
Sample
46f117486fe4250b5fe0265d5badcc1cb8c0e0b16ac7ecb7c4573b32a4e0abf6.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
46f117486fe4250b5fe0265d5badcc1cb8c0e0b16ac7ecb7c4573b32a4e0abf6.dll
Resource
win10v2004-20220901-en
General
-
Target
46f117486fe4250b5fe0265d5badcc1cb8c0e0b16ac7ecb7c4573b32a4e0abf6
-
Size
84KB
-
MD5
55926b668deb5ae32a5c4901397bae4e
-
SHA1
fd7468e07e6596d91500f524d8a70149ba8fa5bd
-
SHA256
46f117486fe4250b5fe0265d5badcc1cb8c0e0b16ac7ecb7c4573b32a4e0abf6
-
SHA512
d4c3c0cbaf3fc35fb9f4d0bb0e5f2fbb86a475e5b8c2580ecdc47f2bd35e7db642cb42060a1dd1437fe0d8eee0421bee9b391f0d7159179624a82424137e4242
-
SSDEEP
1536:bG6h6Lsogz70ii7DykXNDRf4c3uefbUfFnIGUxk2:bGc6iHZ4Ac1fbUfFn0x
Malware Config
Signatures
Files
-
46f117486fe4250b5fe0265d5badcc1cb8c0e0b16ac7ecb7c4573b32a4e0abf6.dll windows x86
b6c3d5d8b331ae6c79cf189de099def2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
GetWindowsDirectoryW
GlobalAlloc
PurgeComm
MoveFileExA
lstrcmpA
GlobalMemoryStatus
GetSystemDefaultUILanguage
ReplaceFileW
GlobalFindAtomW
DeleteTimerQueue
SetFilePointer
UnregisterWaitEx
GetModuleHandleExW
FillConsoleOutputCharacterW
GetEnvironmentStringsW
GetModuleHandleW
GlobalReAlloc
FindFirstChangeNotificationA
GetFileType
FileTimeToSystemTime
GlobalGetAtomNameW
SetEnvironmentVariableA
GetFileAttributesA
AssignProcessToJobObject
GetStartupInfoA
FreeConsole
SetVolumeLabelA
RegisterWaitForSingleObject
UnlockFileEx
GlobalDeleteAtom
PostQueuedCompletionStatus
GetCurrentThreadId
FreeLibraryAndExitThread
CreateNamedPipeA
OpenThread
VerifyVersionInfoA
ResetEvent
TransactNamedPipe
CreateMailslotA
GetConsoleMode
SetFilePointerEx
OpenFile
FreeResource
FreeEnvironmentStringsW
SetDefaultCommConfigW
VerLanguageNameW
DeleteVolumeMountPointW
IsBadStringPtrW
CreateJobObjectW
GetUserDefaultUILanguage
ConvertDefaultLocale
QueueUserWorkItem
ExitThread
ReadFileEx
SetEvent
GetSystemDirectoryA
lstrlenW
InterlockedCompareExchange
GetModuleHandleA
GetSystemTimeAsFileTime
HeapFree
WriteFile
CreateProcessA
CreateMutexA
InterlockedExchange
GetComputerNameA
InterlockedDecrement
LoadLibraryA
GetCommandLineA
GetProcAddress
LocalFree
LeaveCriticalSection
CreateFileA
VirtualProtect
IsBadReadPtr
VirtualQuery
ole32
StringFromIID
OleSetMenuDescriptor
OleSaveToStream
OleCreateLink
OleDoAutoConvert
CoQueryProxyBlanket
OleLoadFromStream
CoInitialize
CoUninitialize
oleaut32
SysAllocStringByteLen
SysFreeString
shlwapi
PathMatchSpecW
PathAppendA
PathCommonPrefixW
PathFileExistsA
PathIsUNCServerW
PathRemoveExtensionW
PathAddBackslashA
StrCmpNW
StrStrIW
StrNCatW
UrlCreateFromPathW
PathUnquoteSpacesW
advapi32
OpenEventLogA
RegSaveKeyA
RegQueryValueExW
RegUnLoadKeyA
RegCreateKeyA
LogonUserA
RegConnectRegistryW
RegCreateKeyExW
GetServiceDisplayNameW
LogonUserW
IsTokenRestricted
CreateProcessAsUserA
RegDeleteKeyA
GetSecurityDescriptorSacl
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegFlushKey
EnumDependentServicesW
GetUserNameW
CreateProcessAsUserW
shell32
SHGetSettings
DragAcceptFiles
DragFinish
ShellExecuteExA
gdi32
SetBitmapDimensionEx
CreatePolygonRgn
EnumEnhMetaFile
CreateRoundRectRgn
SetMapperFlags
GetTextExtentPointA
FlattenPath
CreateDIBitmap
GetRgnBox
PlayMetaFileRecord
PaintRgn
CreateICA
GetTextExtentPoint32A
GetBkMode
SetROP2
GetTextCharsetInfo
CreateMetaFileA
CreateDiscardableBitmap
StretchBlt
SetMagicColors
Polygon
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ