confcrtCmds
Static task
static1
Behavioral task
behavioral1
Sample
5a3107b91bb9a2abe996d9eafef5e9046e0b401af154ccfda74f48e91332c090.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5a3107b91bb9a2abe996d9eafef5e9046e0b401af154ccfda74f48e91332c090.dll
Resource
win10v2004-20221111-en
General
-
Target
5a3107b91bb9a2abe996d9eafef5e9046e0b401af154ccfda74f48e91332c090
-
Size
88KB
-
MD5
40550c397f320248155a0335a0e23d02
-
SHA1
b6ebda05b3c9bbdb94427bd6714639e42948f32a
-
SHA256
5a3107b91bb9a2abe996d9eafef5e9046e0b401af154ccfda74f48e91332c090
-
SHA512
7dc8737375dd30072eb3bfcb1a70273e2d916d58c5366699b91747fee002898e033d4af03830df95a421278ee2eca10e624cec14db121cfeda310bcf22062f7a
-
SSDEEP
1536:RJNRBYHV5dqKvnNTntxgVYo11oNyrvUjMXx49yPzLxVlnxg/Mz9vW:uHVFNTntxA3pvUjMXx40rlvxg0h+
Malware Config
Signatures
Files
-
5a3107b91bb9a2abe996d9eafef5e9046e0b401af154ccfda74f48e91332c090.dll windows x86
c2156ec00685be83c1a7acb1beb87d61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
IsDBCSLeadByteEx
GetVolumeInformationW
FindAtomA
WaitForMultipleObjectsEx
GlobalAddAtomW
GetVolumePathNameW
GetSystemDefaultLangID
RtlMoveMemory
IsProcessorFeaturePresent
GetEnvironmentVariableA
ExitProcess
SetFilePointerEx
WriteProfileStringA
ExpandEnvironmentStringsA
FindFirstChangeNotificationW
FlushFileBuffers
SetCommTimeouts
GetNumberFormatA
HeapValidate
CreateTimerQueue
ReadFileEx
IsValidLocale
GetStartupInfoW
GetFileSizeEx
GlobalFindAtomA
VirtualProtect
ConnectNamedPipe
LocalLock
SetCurrentDirectoryW
ChangeTimerQueueTimer
ReadProcessMemory
VerSetConditionMask
GetModuleFileNameW
SetMailslotInfo
GetDiskFreeSpaceExW
GetEnvironmentVariableW
FormatMessageA
GlobalMemoryStatus
OpenJobObjectW
CreateTimerQueueTimer
UnregisterWaitEx
IsBadReadPtr
FindActCtxSectionGuid
GetCurrencyFormatA
ReadConsoleW
SetConsoleCtrlHandler
FlushConsoleInputBuffer
SetVolumeLabelW
GetSystemTimeAdjustment
ReadConsoleInputA
LocalSize
GetLastError
HeapFree
WriteFile
CreateDirectoryA
InterlockedDecrement
SetLastError
GetCommandLineA
lstrlenA
InterlockedCompareExchange
VirtualQuery
LoadLibraryA
GetSystemDirectoryA
GetProcAddress
GetComputerNameA
HeapAlloc
GetModuleHandleA
GetCurrentProcess
CreateMutexA
user32
ChildWindowFromPointEx
DrawFrameControl
DeferWindowPos
IsCharAlphaW
CharNextW
CharUpperA
GetMessagePos
UnregisterHotKey
PostMessageW
OpenDesktopA
CreateDialogParamW
GetWindowLongA
UnregisterClassW
ScrollDC
SetWindowLongA
GetDesktopWindow
GetWindowRect
HideCaret
LoadStringA
InSendMessageEx
ShowScrollBar
TabbedTextOutA
BeginDeferWindowPos
UnhookWindowsHook
GetMessageExtraInfo
SendInput
GetCursorPos
MessageBoxExW
GetNextDlgTabItem
GetDialogBaseUnits
InsertMenuItemA
EnumThreadWindows
ShowCursor
WaitMessage
DestroyIcon
InsertMenuA
IsDialogMessageA
IsDialogMessageW
EndDialog
MessageBoxW
GetSysColor
IsWindow
LoadMenuW
SetMenuItemBitmaps
LoadCursorW
IsChild
PostThreadMessageW
DestroyCursor
DefDlgProcW
GetUserObjectInformationW
IsCharAlphaA
ClientToScreen
InternalGetWindowText
CreateAcceleratorTableA
GetWindowThreadProcessId
RegisterClassExA
DefWindowProcA
FindWindowA
DestroyWindow
KillTimer
SetTimer
GetParent
PostMessageA
CallWindowProcA
advapi32
SetSecurityInfo
RegDeleteValueW
EnumDependentServicesA
ChangeServiceConfig2W
CredGetSessionTypes
DeregisterEventSource
OpenThreadToken
GetServiceDisplayNameW
CreateServiceW
GetEffectiveRightsFromAclW
RegOpenCurrentUser
StartServiceCtrlDispatcherW
OpenServiceW
RegSetValueExA
RegCloseKey
RegOpenKeyExA
CheckTokenMembership
shell32
SHGetFolderLocation
SHChangeNotify
SHGetSettings
SHParseDisplayName
ExtractIconW
SHGetInstanceExplorer
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ