PWCEP
Static task
static1
Behavioral task
behavioral1
Sample
3c9d59f5a4b6c0f0752d3c04ed04938826a3019224f7a81f16a44480d80530fd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c9d59f5a4b6c0f0752d3c04ed04938826a3019224f7a81f16a44480d80530fd.dll
Resource
win10v2004-20220901-en
General
-
Target
3c9d59f5a4b6c0f0752d3c04ed04938826a3019224f7a81f16a44480d80530fd
-
Size
120KB
-
MD5
4fa59ea7cf7c31be92dea49e7fbebf90
-
SHA1
4e40f578559b67a2f9c55d3ceadfef6327b191e0
-
SHA256
3c9d59f5a4b6c0f0752d3c04ed04938826a3019224f7a81f16a44480d80530fd
-
SHA512
ea504cc6db4e31e6b8f2457204cca987f6b967b65126ac737569b1d3365a416d6c3dd330a0d7b7d5694591d9f317e3b06d0b4231f28b13a33dacbe6ca326227a
-
SSDEEP
3072:P2If1i2PuhAN7/tHGSuono9CbCGYM8D/ZO2pq:pM2/ztQT/M8DBj
Malware Config
Signatures
Files
-
3c9d59f5a4b6c0f0752d3c04ed04938826a3019224f7a81f16a44480d80530fd.dll windows x86
5294cb8e0e931a0267cfd128a9a8748e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LockServiceDatabase
UnlockServiceDatabase
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueA
AllocateAndInitializeSid
RegEnumKeyExW
RegCloseKey
RegEnumValueA
RegSetValueExA
RegQueryInfoKeyA
FreeSid
RegQueryInfoKeyW
ChangeServiceConfigA
RegQueryValueExW
RegOpenKeyW
EqualSid
RegCreateKeyExA
RegQueryValueExA
RegQueryValueW
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueW
InitializeSecurityDescriptor
RegFlushKey
RegCreateKeyExW
ChangeServiceConfig2A
RegOpenKeyExA
RegDeleteValueW
RegSetValueExW
LookupPrivilegeValueA
CloseServiceHandle
LookupAccountSidW
GetTokenInformation
version
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
GetFileVersionInfoSizeA
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleHandleA
LoadLibraryA
GetHandleInformation
GetProcAddress
IsValidLocale
GetConsoleCP
lstrcmpiW
GetLocaleInfoA
CreateFileMappingW
lstrcmpW
CompareStringW
CopyFileA
GetTempFileNameW
GetCurrentProcessId
CreateThread
SetEndOfFile
LoadResource
FindResourceA
CreateFileA
CreateProcessA
GetFileSize
WaitForSingleObject
GetCurrentThread
lstrcpynW
FindResourceW
VirtualAlloc
ExitProcess
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CloseHandle
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ