cmmyev
Static task
static1
Behavioral task
behavioral1
Sample
94dc9fb44df7852e1ef078917084291bab5d4f57ed05bf3478483008c41f835f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94dc9fb44df7852e1ef078917084291bab5d4f57ed05bf3478483008c41f835f.dll
Resource
win10v2004-20220901-en
General
-
Target
94dc9fb44df7852e1ef078917084291bab5d4f57ed05bf3478483008c41f835f
-
Size
216KB
-
MD5
6e864228ee789bf3b889d6e47956c1f0
-
SHA1
550d014fe2caeceef0a59a6385a24fcd714508a6
-
SHA256
94dc9fb44df7852e1ef078917084291bab5d4f57ed05bf3478483008c41f835f
-
SHA512
621047a2b52dafef5219733e515b4cd6dcaf95b68909ba291f4f3cc6c42d27f07cb52f9d77d0cf41480b31e9a42be7b6dcfebe3786c747714b40cf7f56e1a86d
-
SSDEEP
6144:kW5Ff4jRLwieWlzRInNEJSRw2DrKlyma7oG+F0FVPVSWWWWWWnQz:Nvf4jtekTJSRwU+lyma7oG+F0nPVSWWi
Malware Config
Signatures
Files
-
94dc9fb44df7852e1ef078917084291bab5d4f57ed05bf3478483008c41f835f.dll windows x86
88e8b523ec7b245145f423ca14271286
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
AddFontResourceTracking
AnimatePalette
CreateEnhMetaFileW
GdiIsPlayMetafileDC
GetObjectA
GetTextFaceA
PlayMetaFileRecord
RemoveFontResourceA
SetWinMetaFileBits
StrokeAndFillPath
EudcLoadLinkW
GdiInitializeLanguagePack
GdiStartDocEMF
GetGlyphIndicesA
SetPolyFillMode
ColorMatchToTarget
EngCreateDeviceSurface
EngDeleteClip
EngGetCurrentCodePage
GdiEntry9
GdiFixUpHandle
GdiGetCodePage
GetROP2
GetTextExtentExPointWPri
LineTo
ResetDCW
SetRelAbs
SetTextJustification
StrokePath
bInitSystemAndFontsDirectoriesW
cGetTTFFromFOT
FONTOBJ_pvTrueTypeFontFile
CreatePatternBrush
EndPath
EngCreateSemaphore
EngStretchBltROP
GdiAddGlsRecord
GdiDescribePixelFormat
GetBitmapBits
GetFontResourceInfoW
GetMetaFileBitsEx
GetOutlineTextMetricsA
OffsetClipRgn
SetBkMode
SetLayoutWidth
SetWindowOrgEx
CheckColorsInGamut
CreateBitmap
DescribePixelFormat
EngLineTo
FillPath
GdiIsMetaPrintDC
GdiReleaseDC
GetObjectType
GetPixel
GetRegionData
SetColorSpace
kernel32
CancelIo
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateJobObjectW
CreateMutexA
CreateThread
DebugActiveProcess
DeviceIoControl
EraseTape
ExpandEnvironmentStringsA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
GetLongPathNameA
GetOverlappedResult
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcessVersion
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryA
InterlockedCompareExchange
InterlockedExchange
LoadLibraryA
OpenProcess
QueryDosDeviceW
QueryPerformanceCounter
QueueUserAPC
ReadFile
ReleaseMutex
RemoveDirectoryW
SetEvent
Sleep
SuspendThread
WaitForMultipleObjects
WaitForSingleObject
WriteFile
ChangeTimerQueueTimer
CreateEventW
GetProfileSectionW
GlobalFindAtomA
IsBadReadPtr
OpenSemaphoreA
OpenThread
ResetEvent
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObjectEx
WritePrivateProfileSectionW
ConnectNamedPipe
DelayLoadFailureHook
DuplicateHandle
FreeEnvironmentStringsA
GetConsoleTitleW
GetDriveTypeA
GetEnvironmentStrings
GetPriorityClass
GetTapePosition
Heap32ListNext
LoadLibraryW
OpenJobObjectW
Process32First
SetUnhandledExceptionFilter
ClearCommError
TerminateProcess
UnhandledExceptionFilter
CompareFileTime
CreateFileMappingW
CreateFileW
DeleteFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageW
GetComputerNameW
GetDateFormatW
GetFileSizeEx
GetProcessIoCounters
GetSystemWindowsDirectoryW
GetTempFileNameW
LocalFree
LocalLock
MapViewOfFile
ReadFileEx
RegisterWaitForSingleObjectEx
SearchPathA
SetFileAttributesW
SetFilePointerEx
SetMailslotInfo
SetStdHandle
SleepEx
UnmapViewOfFile
VirtualAllocEx
WritePrivateProfileStringW
lstrcmp
lstrcmpiW
CancelWaitableTimer
DeleteFiber
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetConsoleAliasExesLengthA
GetLocaleInfoW
GetProcessHeap
GetStdHandle
GetSystemPowerStatus
GetWindowsDirectoryW
HeapSummary
Module32NextW
OpenFileMappingW
QueueUserWorkItem
SetProcessWorkingSetSize
lstrcmpW
VirtualAlloc
WideCharToMultiByte
GetLastError
DecodePointer
GetCommandLineA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
GetModuleHandleW
SetLastError
GetCurrentThread
GetProcAddress
IsDebuggerPresent
GetStringTypeW
LCMapStringW
IsProcessorFeaturePresent
HeapFree
ExitProcess
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
MultiByteToWideChar
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapAlloc
HeapReAlloc
SetConsoleCtrlHandler
GetModuleFileNameW
RtlUnwind
HeapSize
oleaut32
BSTR_UserSize
SafeArrayDestroyData
SafeArrayGetLBound
SafeArrayGetUBound
UnRegisterTypeLi
VarDateFromUdateEx
VarUI1FromDec
LPSAFEARRAY_Marshal
OleSavePictureFile
VarDecCmp
VarImp
LHashValOfNameSys
VarCyAdd
VarCyFromStr
VarI1FromCy
VarI2FromCy
VarR4CmpR8
VarR8FromBool
VarR8FromUI1
VarI4FromCy
LoadTypeLibEx
SafeArrayCreate
VarBstrFromR4
VarDateFromUI1
VarR4FromDec
OleCreateFontIndirect
SysAllocStringByteLen
VarDecFromStr
VarI1FromUI1
VarParseNumFromStr
VarR4FromR8
VarTokenizeFormatString
VarWeekdayName
user32
CallWindowProcW
CreateDialogParamA
DlgDirSelectComboBoxExA
FindWindowA
GetWindowPlacement
LoadStringA
MessageBoxA
OpenWindowStationA
PostMessageA
PostThreadMessageA
RegisterWindowMessageA
SetDebugErrorLevel
SetMenuDefaultItem
wsprintfA
wvsprintfA
DdeAccessData
AdjustWindowRectEx
CharNextW
DdeGetData
DefWindowProcW
GetClipboardSequenceNumber
GetLastActivePopup
InflateRect
IsCharUpperA
IsWindowUnicode
LockWorkStation
PeekMessageW
RealChildWindowFromPoint
ScreenToClient
SetClipboardViewer
EnumClipboardFormats
GetUpdateRgn
ReleaseCapture
DestroyCursor
EnumDisplayDevicesA
EnumDisplayMonitors
GetKBCodePage
GetMessagePos
GetProcessDefaultLayout
IMPGetIMEA
IsRectEmpty
LoadCursorFromFileW
PtInRect
SetForegroundWindow
WinHelpA
GetClientRect
GetDesktopWindow
GetMenuItemID
IMPSetIMEW
LoadStringW
MonitorFromWindow
RegisterClipboardFormatW
SetCapture
SetWindowLongW
Exports
Exports
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ