Static task
static1
Behavioral task
behavioral1
Sample
d15de3a372ae2aa84a90ed19a079f3611696ce1589b78bed30618901c5813fb9.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d15de3a372ae2aa84a90ed19a079f3611696ce1589b78bed30618901c5813fb9.dll
Resource
win10v2004-20220812-en
General
-
Target
d15de3a372ae2aa84a90ed19a079f3611696ce1589b78bed30618901c5813fb9
-
Size
88KB
-
MD5
21cfb46c4e49c2adeb8490dd145ed940
-
SHA1
af9fc38a60620b9fe3cffdc4e048dfacd02881fe
-
SHA256
d15de3a372ae2aa84a90ed19a079f3611696ce1589b78bed30618901c5813fb9
-
SHA512
ff9da923c56122a46ad319255fa136516bb2fd6ad1b5547a2033da00d088453cb53b6caf7433680392cbd5d4851fa612445d381ac8f05f748eae4b9645e6633d
-
SSDEEP
1536:8wy8Z/sHSlLgd1Gq3ytOcvUWNSU1909XlU4uNC/bVdQdueqy:8WZ/sHS1g+1gWNSU1901e/UbQdue
Malware Config
Signatures
Files
-
d15de3a372ae2aa84a90ed19a079f3611696ce1589b78bed30618901c5813fb9.dll windows x86
633b138305228f263926eda3447b4aff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
aipsys
?Close@DEVICE@@UAEHAAH@Z
?Init@PDEV@@UAEHXZ
?Lock@DEVICE@@UAEXXZ
?Open@DEVICE@@UAEHXZ
?Term@PDEV@@UAEHXZ
?Unlock@DEVICE@@UAEXXZ
?Confirmed@PDEV@@UBEHE@Z
?FillDeviceInformation@PDEV@@UAEXEEE@Z
?getByte@PDEV@@UAEHQAE@Z
?GetPdevDeviceDescription@PDEV@@UAEPAEXZ
?GetPdevDeviceName@PDEV@@UAEPAEXZ
?GetVdevInfo@PDEV@@UBEHEAAEAAJ@Z
?NowConfirmed@PDEV@@UAEXXZ
?NowNotConfirmed@PDEV@@UAEXXZ
?ProcessInput@SIODEVICE@@UAEXPBEH@Z
?ProcessError@SIODEVICE@@UAEXPBEH@Z
?ProcessOutput@SIODEVICE@@UAEXJ@Z
?TellQueueWhosOnline@PDEV@@UAEXPBUMsgQueueInfo@@@Z
?Acquire@PDEV@@UAEHPAVVDEV@@@Z
?Release@PDEV@@UAEHPAVVDEV@@@Z
?SendMsg@SIODEVICE@@UAEHPBEH@Z
??0ObjectSupport@@QAE@GP6APAVPDEV@@ABUDeviceID@@@ZQAEH@Z
aipkbd
?CommandResetInProgress@KBP@@MAEXXZ
?Close@KBP@@MAEHPBVVDEV@@AAH@Z
?Open@KBP@@MAEHQBVVDEV@@@Z
?LastMsgLost@KBP@@MAEXPBEH@Z
?LastAckLost@KBP@@MAEXPBEH@Z
?LastMsgAcked@KBP@@MAEXXZ
?SequenceResetInProgress@KBP@@MAEXPBEH@Z
?ResetComplete@KBP@@MAEXXZ
?SendAnyPendingMessage@KBP@@MAEHXZ
?KbdHandler@KBP@@UAEHPAUKBDATA@@EAAE@Z
aipkbdob
?NewMsgRcvd@KBOBP@@EAEXPBEH@Z
?PowerOnResetInProgress@KBOBP@@MAEXXZ
aipkplu
?ValidateDoubleKey@KBOPLUP@@UAEHEE@Z
??1KBOPLUP@@UAE@XZ
?TellPhys@KBOPLUP@@MAEHPBVVDEV@@HPAEH@Z
?SetLEDBits@KBOJP@@MAEXPAEE@Z
?InterpretScanCode@KBOPLUP@@MAEXPBEHH@Z
?UpdateMicrocode@KBOPLUP@@EAEXXZ
??0KBOPLUP@@QAE@ABUDeviceID@@PBE@Z
?ValidateNumpadLocation@KBOPLUP@@UAEHH@Z
?ValidateNumpadStyle@KBOPLUP@@UAEHH@Z
kernel32
HeapAlloc
GetVersion
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetStartupInfoA
TlsGetValue
SetLastError
GetLastError
TlsAlloc
TlsSetValue
TlsFree
GetCurrentProcess
TerminateProcess
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetCommandLineA
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
GetEnvironmentStringsW
HeapFree
ExitProcess
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE