EEGetModuleInterop
Static task
static1
Behavioral task
behavioral1
Sample
7c21957e8c6179fc2f15bf0802e5c94dc2d5b5a3ebac9a13ad80b9acaa6bb066.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7c21957e8c6179fc2f15bf0802e5c94dc2d5b5a3ebac9a13ad80b9acaa6bb066.dll
Resource
win10v2004-20220812-en
General
-
Target
7c21957e8c6179fc2f15bf0802e5c94dc2d5b5a3ebac9a13ad80b9acaa6bb066
-
Size
240KB
-
MD5
59d55e42d75c481a69b98b204c37d664
-
SHA1
4d0cf94e617ef8dc907d46a7ec2a5a09cb9de8a9
-
SHA256
7c21957e8c6179fc2f15bf0802e5c94dc2d5b5a3ebac9a13ad80b9acaa6bb066
-
SHA512
aa29cc0ec42a716fe9c9c482c1f0283c8ad11771bae2053eec0fdbc9eb9713c495a1a9cdfdab38872aa4bc56ac7ff57331c7dc4bf70d1b3e2a5bab2b0dc8ebb2
-
SSDEEP
3072:jiZ2ETTGxb6TadkSDs2uz/F/Re0Nu8oRU4QGDFJQZSI1/rsDfTrrd6j8nl:klOZJdXsJC8oSn3rs33ugl
Malware Config
Signatures
Files
-
7c21957e8c6179fc2f15bf0802e5c94dc2d5b5a3ebac9a13ad80b9acaa6bb066.dll windows x86
5fe5ac9312eb2cf6521f4170de4d6d33
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strcmp
qsort
_snwprintf
memcpy
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
_except_handler3
acccore
ord111
ord132
ord131
xprt5
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
??0TBstr@XPRT@@QAE@XZ
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
_XprtMemRealloc@8
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtCreateThread@8
_XprtGetMilliseconds@0
_XprtDestroyThread@8
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Right@TBstr@XPRT@@QBE?AV12@H@Z
?Lock@TSpinLock@XPRT@@QAEXXZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?GetAt@TBstr@XPRT@@QBEGH@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
?IsEmpty@TBstr@XPRT@@QBE_NXZ
xprt_strcmp
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
?Left@TBstr@XPRT@@QBE?AV12@H@Z
?Find@TBstr@XPRT@@QBEHGH@Z
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??0TBstr@XPRT@@QAE@PBDPBG@Z
?Term@TCritSec@XPRT@@QAEXXZ
?Init@TCritSec@XPRT@@QAEXXZ
?Compare@TBstr@XPRT@@QBEHPBG@Z
??0TBstr@XPRT@@QAE@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
?Append@TBstr@XPRT@@QAEAAV12@PBG@Z
??1TBstr@XPRT@@QAE@XZ
?Append@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
kSystemEncoding
?ToInt@TBstr@XPRT@@QBEHH@Z
kAsciiEncoding
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
_XprtMemAlloc@4
_XprtAllocString@4
?Empty@TBstr@XPRT@@QAEXXZ
_XprtStringLen@4
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
?GetString@TBstr@XPRT@@QBEPBGXZ
xprt_iswdigit
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
xprt_memmove
?Unlock@TSpinLock@XPRT@@QAEXXZ
?Copy@TBstr@XPRT@@QBEPAGXZ
_XprtCanonicalizeScreenName@8
xprt_memset
?Append@TBstr@XPRT@@QAEAAV12@G@Z
?Normalize@TBstr@XPRT@@QAEAAV12@XZ
?RemoveAt@TPtrArray@XPRT@@QAEXHH@Z
??0TPtrArray@XPRT@@QAE@XZ
??1TPtrArray@XPRT@@QAE@XZ
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
_XprtMemFree@4
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
?GetLength@TBstr@XPRT@@QBEHXZ
?GetBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
xprt_snwprintf
?Find@TBstr@XPRT@@QBEHPBGH@Z
?Delete@TBstr@XPRT@@QAEHHH@Z
?GetRawBstrPtr@TBstr@XPRT@@QAEPAPAGXZ
_XprtAtomicDecrement@4
_XprtAtomicIncrement@4
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?Detach@TBstr@XPRT@@QAEPAGXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
coolcore46
_XpcsCreateSimpleInstance@12
_XpcsSafeArrayDestroy@4
_XpcsSafeArrayPutElement@12
_XpcsVarCopy@8
_XpcsSafeArrayUnlock@4
_XpcsSafeArrayLock@4
_XpcsVarChangeType@12
_XpcsSafeArrayGetElement@12
_XpcsSafeArrayGetUBound@12
_XpcsSafeArrayGetLBound@12
_XptlAdvise@16
_XptlUnadvise@12
_XpcsVarClear@4
_XptlInternalQueryInterface@16
_XptlComPtrAssign@8
kernel32
GetProcAddress
GetModuleHandleW
CloseHandle
SetEvent
ResetEvent
InterlockedCompareExchange
GetCurrentThreadId
ExitProcess
DisableThreadLibraryCalls
CreateEventW
user32
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
SetTimer
KillTimer
PeekMessageW
ole32
CoRegisterMessageFilter
CoUninitialize
CreateBindCtx
CoCreateInstance
CoInitializeEx
oleaut32
VariantChangeType
SafeArrayDestroy
VariantClear
SafeArrayRedim
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayUnlock
SafeArrayCreate
SafeArrayLock
SafeArrayCopy
VariantInit
VariantCopy
SysAllocString
SysFreeString
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE