CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
fa50612f0a58ae4f9fdb9ea3541d06296d2e7d056dccc5cbb3555ad293df820f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa50612f0a58ae4f9fdb9ea3541d06296d2e7d056dccc5cbb3555ad293df820f.dll
Resource
win10v2004-20220812-en
General
-
Target
fa50612f0a58ae4f9fdb9ea3541d06296d2e7d056dccc5cbb3555ad293df820f
-
Size
80KB
-
MD5
532986a84f73ec6d3f14775533084073
-
SHA1
2eac9e312278401bff8fb225c67ccbe0dc57058f
-
SHA256
fa50612f0a58ae4f9fdb9ea3541d06296d2e7d056dccc5cbb3555ad293df820f
-
SHA512
e6afedeb8f4a9f63bf367afda41ebe4f65542565a26cf787964f941a50fc75b24e4472880ac4327b5d609e99eebaea4b75f7d0a0faaf024a6239e30533ce1ee6
-
SSDEEP
1536:c/wObRWaxXm/5vk4jatYhN0o3M8+Wphr/xFQXT7:c/wx5sPQM8+WphrLQXT
Malware Config
Signatures
Files
-
fa50612f0a58ae4f9fdb9ea3541d06296d2e7d056dccc5cbb3555ad293df820f.dll windows x86
6251db3ffc04a7945ed8060d66afc3fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetComputerNameExW
GetModuleFileNameW
GetVersion
OpenFileMappingW
WriteConsoleInputA
AddAtomA
MoveFileExW
SetCommTimeouts
AssignProcessToJobObject
WaitForSingleObject
CancelIo
GetDefaultCommConfigW
TryEnterCriticalSection
GetCommTimeouts
SetEndOfFile
CreateWaitableTimerW
CreateIoCompletionPort
CreateJobObjectW
HeapDestroy
GetUserDefaultLCID
FindClose
LockResource
GetFileAttributesW
lstrcatW
VirtualQuery
ReadConsoleInputW
FreeEnvironmentStringsW
HeapCreate
VirtualQueryEx
RtlUnwind
SetVolumeLabelW
MultiByteToWideChar
PostQueuedCompletionStatus
CreateThread
ReadProcessMemory
IsValidCodePage
ReadFile
GetFullPathNameA
SetConsoleTitleA
WriteProfileStringW
GetSystemPowerStatus
GlobalFindAtomA
GetStringTypeA
GetModuleHandleW
GetStringTypeW
CreateNamedPipeW
ReadConsoleInputA
lstrcmpA
FreeLibraryAndExitThread
GetTickCount
GetVolumeInformationA
LeaveCriticalSection
CreateDirectoryA
CloseHandle
SetLastError
GetLastError
ExitProcess
SetEvent
GetSystemTimeAsFileTime
UnmapViewOfFile
InterlockedCompareExchange
GetModuleFileNameA
OpenEventA
CreateFileA
GetProcessHeap
GetModuleHandleA
GetProcAddress
CreateProcessA
InterlockedExchange
FreeResource
LoadLibraryA
ole32
OleLoadFromStream
OleSaveToStream
ReadFmtUserTypeStg
CoMarshalInterface
OleSave
StringFromGUID2
CreatePointerMoniker
CoMarshalInterThreadInterfaceInStream
CoTaskMemFree
CoTaskMemAlloc
shlwapi
SHDeleteKeyW
StrCmpNW
PathFindExtensionW
PathBuildRootW
PathAppendA
PathIsURLW
PathCombineW
PathIsUNCServerW
PathFindFileNameA
StrRetToStrW
wnsprintfA
StrStrIW
UrlUnescapeW
SHSetValueA
gdi32
SetTextJustification
GetCurrentPositionEx
AnimatePalette
Chord
EnumFontsA
CreateDIBSection
CreatePolygonRgn
EnumFontFamiliesExA
TextOutW
ScaleWindowExtEx
RemoveFontResourceA
SetBitmapDimensionEx
PaintRgn
ModifyWorldTransform
GetEnhMetaFileA
FlattenPath
EnumFontFamiliesA
GetNearestPaletteIndex
CreatePen
OffsetWindowOrgEx
ExtEscape
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ