HtmInit
Static task
static1
Behavioral task
behavioral1
Sample
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll
Resource
win10v2004-20220901-en
General
-
Target
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a
-
Size
384KB
-
MD5
44da9f4aaf7026e305516d93c8aa3685
-
SHA1
1de6e4eea9115605b1b1bdd094626f6d89eec9b2
-
SHA256
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a
-
SHA512
0ddaf60b5d399e2611c4487e4ab44a9b235218ab40e6a9f68e1749b742a4b70708569f8a6a076c758ce2406daf630c64d6620b51a78b74996db635c94dc2355a
-
SSDEEP
6144:4ZFeM1qzrxv1pybOoFUCCBcgaFbcgIRO9:4nT1sv1pJFmga1c
Malware Config
Signatures
Files
-
3f32ec05060f381aa1b6663ccfcb3ff710b2813b953d180b95b3518a5139007a.dll windows x86
d1feb134ff702a2aee8cab59ef516c09
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetProcessImageFileNameA
kernel32
InterlockedIncrement
GlobalFlags
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
GetCommandLineA
TerminateProcess
ExitThread
CreateThread
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
WritePrivateProfileStringA
SetErrorMode
lstrcatA
InterlockedDecrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpynA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SuspendThread
ResumeThread
SetThreadPriority
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
lstrlenA
CompareStringA
CompareStringW
GetVersion
RaiseException
DeleteCriticalSection
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
CreateEventA
GetModuleFileNameA
FindResourceA
SizeofResource
GetLastError
LoadResource
LockResource
DeleteFileA
MoveFileA
FreeResource
GetTickCount
lstrcmpiA
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
SetEvent
WaitForSingleObject
CloseHandle
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetSystemTimeAsFileTime
user32
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
ShowWindow
GetDlgItem
LoadCursorA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SendMessageTimeoutA
RegisterWindowMessageA
SendMessageA
GetClassNameA
EnumChildWindows
GetWindowThreadProcessId
GetWindowTextA
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
GetSystemMetrics
SetMenuItemBitmaps
GetFocus
ModifyMenuA
DestroyMenu
WinHelpA
SetWindowLongA
GetCapture
GetParent
IsWindowVisible
IsWindowEnabled
IsWindow
UnregisterClassA
CharUpperA
PostQuitMessage
PostMessageA
SetCursor
EnableWindow
GetLastActivePopup
GetWindowLongA
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
gdi32
DeleteDC
GetStockObject
SelectObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
shlwapi
PathFindFileNameA
PathRemoveFileSpecA
StrStrIA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VarBstrCmp
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ