SystemHelpCmds
Static task
static1
Behavioral task
behavioral1
Sample
c3f6f6e17e9cc6772809d2f9e6d570032da5088f1d2d9fd3271118ff6ea5b842.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3f6f6e17e9cc6772809d2f9e6d570032da5088f1d2d9fd3271118ff6ea5b842.dll
Resource
win10v2004-20220812-en
General
-
Target
c3f6f6e17e9cc6772809d2f9e6d570032da5088f1d2d9fd3271118ff6ea5b842
-
Size
144KB
-
MD5
c413750c57de84bf01a93f12c830a367
-
SHA1
3987b9a2184a4c685caa3e715559ed8d9670d477
-
SHA256
c3f6f6e17e9cc6772809d2f9e6d570032da5088f1d2d9fd3271118ff6ea5b842
-
SHA512
95c84ccd1c3e2ac88eb96abfa151f5dd23f19260ceca814dbf15a6b72e72436c856ef1e74c3f39d4cbc90d209258ad63866917d985093d3630c24f684452c42c
-
SSDEEP
3072:K/NDrVc1viAufiifPoSCecThJ58Z/cLMUuI2b/xq/sI:uNy11i4Y0e/cwI2Txq/sI
Malware Config
Signatures
Files
-
c3f6f6e17e9cc6772809d2f9e6d570032da5088f1d2d9fd3271118ff6ea5b842.dll windows x86
c479944f11cbf758f219164b3a502f7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetTickCount
LocalFree
OpenEventA
HeapFree
GetProcAddress
Sleep
LeaveCriticalSection
LoadLibraryA
OpenFileMappingA
GetModuleFileNameA
WaitForSingleObject
HeapAlloc
ExitProcess
MapViewOfFile
CreateFileA
EnterCriticalSection
GetCommandLineA
CopyFileA
CreateProcessA
GlobalFree
GlobalAlloc
CreateMutexW
GetModuleHandleA
WriteFile
ReadProcessMemory
GetLastError
CreateFileMappingA
SetLastError
TerminateProcess
GetVolumeInformationA
GetProcessHeap
InterlockedIncrement
UnmapViewOfFile
GetComputerNameA
GetCurrentProcess
InterlockedDecrement
CreateEventA
WriteProcessMemory
CloseHandle
InterlockedCompareExchange
ole32
CoCreateGuid
CoUninitialize
CoInitialize
CoSetProxyBlanket
CoTaskMemAlloc
OleCreate
OleSetContainedObject
CoCreateInstance
user32
GetSystemMetrics
ClientToScreen
PostQuitMessage
DefWindowProcA
UnhookWindowsHookEx
DispatchMessageA
KillTimer
RegisterWindowMessageA
TranslateMessage
FindWindowA
GetWindowThreadProcessId
SetWindowLongA
GetClassNameA
GetMessageA
DestroyWindow
GetParent
SetTimer
GetWindowLongA
CreateWindowExA
ScreenToClient
SendMessageA
GetCursorPos
PeekMessageA
GetWindow
SetWindowsHookExA
oleaut32
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegDeleteKeyA
RegCloseKey
DuplicateTokenEx
OpenProcessToken
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
SetTokenInformation
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ