CatDBMapVdm
Static task
static1
Behavioral task
behavioral1
Sample
a25c7321d4d934bc9fdeffcbf647cf47e0535fa7bcbdfa622cacf5b74eeaee3f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a25c7321d4d934bc9fdeffcbf647cf47e0535fa7bcbdfa622cacf5b74eeaee3f.dll
Resource
win10v2004-20220812-en
General
-
Target
a25c7321d4d934bc9fdeffcbf647cf47e0535fa7bcbdfa622cacf5b74eeaee3f
-
Size
80KB
-
MD5
25fe8b4eef8bae8402d6788a57feecab
-
SHA1
3a9496a2a971439b7b5a35b13327359da4eb56b9
-
SHA256
a25c7321d4d934bc9fdeffcbf647cf47e0535fa7bcbdfa622cacf5b74eeaee3f
-
SHA512
65c376c370a630ec08c4fdc15d7ce863ca165d5374fcfcee9d2be84a3b943714d2b4e615de93e8380090f44531d88a32b774e0233d9466ba8c18b2e6609f0f2b
-
SSDEEP
1536:Qcojb2dC4EGvRxQDwRODumBzqPyMHUvhhHQtZ4GB+owtNx4ps2AaF:O3e3xzROtkPyMHUvhhwt+GB+/v4C
Malware Config
Signatures
Files
-
a25c7321d4d934bc9fdeffcbf647cf47e0535fa7bcbdfa622cacf5b74eeaee3f.dll windows x86
33dd8e871444ca241a2f130e339e33d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetLastError
GetProcAddress
CloseHandle
InitializeCriticalSectionAndSpinCount
HeapAlloc
Sleep
LoadLibraryA
GetModuleHandleA
GetCurrentProcessId
CreateFileMappingA
SetLastError
HeapFree
lstrlenW
FlushViewOfFile
RaiseException
DeleteTimerQueue
InterlockedExchangeAdd
DeviceIoControl
ExitThread
EnumResourceLanguagesA
GlobalDeleteAtom
CreateWaitableTimerW
SetSystemTime
ReleaseActCtx
MoveFileW
SetVolumeMountPointW
GetCommandLineW
TerminateJobObject
GetCPInfo
GetCommTimeouts
FindCloseChangeNotification
EnumResourceNamesW
PostQueuedCompletionStatus
ConvertDefaultLocale
SetFileTime
GetCurrencyFormatA
GetModuleFileNameW
GetProfileStringA
TerminateProcess
FormatMessageW
GetFullPathNameA
GetProfileIntW
IsBadHugeWritePtr
SetWaitableTimer
GetNumberFormatW
EnumSystemLocalesA
GetFileAttributesExW
SearchPathW
lstrcatA
ReadConsoleInputA
ExpandEnvironmentStringsA
GetSystemDefaultUILanguage
CancelIo
CancelWaitableTimer
user32
OpenDesktopW
GetWindowTextW
IsCharAlphaA
FindWindowExA
MessageBoxA
LoadIconA
OemToCharBuffA
IsDlgButtonChecked
AppendMenuA
FindWindowW
ToAscii
DialogBoxIndirectParamA
GetNextDlgGroupItem
MapVirtualKeyW
GetDC
DestroyCursor
GetTabbedTextExtentA
GetCursorPos
CharNextExA
CreateAcceleratorTableW
GetMenuDefaultItem
CharToOemW
OpenInputDesktop
AttachThreadInput
GetInputState
GetScrollRange
ToAsciiEx
DestroyCaret
FillRect
GetClassLongA
OpenWindowStationA
ModifyMenuW
TranslateMessage
KillTimer
SendMessageA
SetWindowsHookExA
DefWindowProcA
IsWindowVisible
RegisterClassExA
shlwapi
SHStrDupW
SHCreateStreamOnFileW
AssocCreate
PathGetDriveNumberW
SHSetValueW
StrToIntW
PathRemoveExtensionW
PathIsRelativeW
StrDupW
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ