uniMapClock
Static task
static1
Behavioral task
behavioral1
Sample
3eaa0fe0f2a0236966fac860ac86e5d08cfaab1b5ff53893b5ecfd793800c06c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3eaa0fe0f2a0236966fac860ac86e5d08cfaab1b5ff53893b5ecfd793800c06c.dll
Resource
win10v2004-20220901-en
General
-
Target
3eaa0fe0f2a0236966fac860ac86e5d08cfaab1b5ff53893b5ecfd793800c06c
-
Size
156KB
-
MD5
4f707268ea05bfb3851cf2fec68851b0
-
SHA1
16503c14d7930a84bbfeb3805b7c5ec5830f5d6c
-
SHA256
3eaa0fe0f2a0236966fac860ac86e5d08cfaab1b5ff53893b5ecfd793800c06c
-
SHA512
99b8bdf0cdc656e3bbe61b06b052f4c75dd532dfee2a941cc59253e57aeb37a88224b59a6c4d6b379f539fa9d16aa8c177bfb126ea104db3bb3237941a176fd9
-
SSDEEP
3072:XV/u8jRtiPOdkLhx/rWyetKya1J1jcIStyGKGw4hyLkdUz+vsqb7pJEPcj:g8NYPOdknrV1JKty51/tzFcJEUj
Malware Config
Signatures
Files
-
3eaa0fe0f2a0236966fac860ac86e5d08cfaab1b5ff53893b5ecfd793800c06c.dll windows x86
43cb5b5322e1de0dc55ee539ddedf04d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
LeaveCriticalSection
CreateMutexW
WriteFile
GetProcessHeap
OpenEventA
GetModuleFileNameA
HeapFree
GetTickCount
Sleep
GlobalFree
GetComputerNameA
WaitForSingleObject
LocalFree
MapViewOfFile
EnterCriticalSection
GetCommandLineA
CloseHandle
InterlockedCompareExchange
TerminateProcess
ReadProcessMemory
InterlockedDecrement
SetLastError
ExitProcess
GlobalAlloc
CreateFileA
CopyFileA
CreateProcessA
CreateFileMappingA
GetLastError
LoadLibraryA
InterlockedIncrement
WriteProcessMemory
UnmapViewOfFile
GetVolumeInformationA
GetModuleHandleA
CreateDirectoryA
GetCurrentProcess
HeapAlloc
OpenFileMappingA
GetProcAddress
ole32
CoInitialize
CoSetProxyBlanket
CoCreateInstance
OleSetContainedObject
OleCreate
CoTaskMemAlloc
CoUninitialize
CoCreateGuid
user32
DispatchMessageA
UnhookWindowsHookEx
GetWindowLongA
TranslateMessage
CreateWindowExA
SendMessageA
GetClassNameA
DefWindowProcA
GetWindow
GetCursorPos
ClientToScreen
SetWindowLongA
DestroyWindow
RegisterWindowMessageA
KillTimer
GetParent
GetWindowThreadProcessId
SetWindowsHookExA
ScreenToClient
FindWindowA
SetTimer
GetMessageA
PostQuitMessage
GetSystemMetrics
PeekMessageA
oleaut32
SysAllocString
SysStringLen
SysFreeString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
GetUserNameA
RegCreateKeyExA
DuplicateTokenEx
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegOpenKeyExA
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ