QuickMousePort
Static task
static1
Behavioral task
behavioral1
Sample
3567fc7e831bdfb07b508e2252f080d1d27a6bd68e07e8d616b43292780e5e6e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3567fc7e831bdfb07b508e2252f080d1d27a6bd68e07e8d616b43292780e5e6e.dll
Resource
win10v2004-20220901-en
General
-
Target
3567fc7e831bdfb07b508e2252f080d1d27a6bd68e07e8d616b43292780e5e6e
-
Size
152KB
-
MD5
411f98cf5d8b78a72fec034390d0c75f
-
SHA1
6f3debc5f04fa5f5be10a1b478bc2573eb08488c
-
SHA256
3567fc7e831bdfb07b508e2252f080d1d27a6bd68e07e8d616b43292780e5e6e
-
SHA512
11e2fc753406ff4ec2752527e6bdebd34395bedabf2ad3e4a38830ed195af4c212ad504fdd4f69d1511866a61703aba094f570d994b4e47b7489355d88eaed82
-
SSDEEP
3072:CNfmcLxVo4ByMxkt+QBna3wTY5RasV40vsZTw2jD1uRmPfCHwEj+/2NuE5OV4qz7:CVBvhByNnRY3D4XuJy/2/5OboY
Malware Config
Signatures
Files
-
3567fc7e831bdfb07b508e2252f080d1d27a6bd68e07e8d616b43292780e5e6e.dll windows x86
20c726e6a827b3daed0580e7cb8b2e61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
ExitProcess
GlobalFree
GetProcAddress
TerminateProcess
UnmapViewOfFile
GetLastError
CreateFileA
SetLastError
GetModuleHandleA
OpenFileMappingA
WriteProcessMemory
CreateEventA
HeapAlloc
GetCommandLineA
OpenEventA
GetVolumeInformationA
GetTickCount
MapViewOfFile
WaitForSingleObject
CreateProcessA
LocalFree
LeaveCriticalSection
HeapFree
InterlockedDecrement
ReadProcessMemory
CopyFileA
GlobalAlloc
GetCurrentProcess
InterlockedCompareExchange
GetModuleFileNameA
CreateFileMappingA
LoadLibraryA
CloseHandle
CreateMutexW
WriteFile
CreateDirectoryA
GetProcessHeap
InterlockedIncrement
Sleep
GetComputerNameA
ole32
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoTaskMemAlloc
OleCreate
CoCreateGuid
OleSetContainedObject
CoCreateInstance
user32
SetTimer
GetParent
RegisterWindowMessageA
PostQuitMessage
SetWindowsHookExA
TranslateMessage
DestroyWindow
GetCursorPos
SendMessageA
ScreenToClient
GetClassNameA
CreateWindowExA
FindWindowA
GetMessageA
UnhookWindowsHookEx
SetWindowLongA
GetWindowThreadProcessId
GetSystemMetrics
KillTimer
PeekMessageA
ClientToScreen
GetWindowLongA
DispatchMessageA
GetWindow
DefWindowProcA
oleaut32
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
SetTokenInformation
RegDeleteValueA
GetUserNameA
OpenProcessToken
DuplicateTokenEx
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pliq Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ