uimujgeoro
Static task
static1
Behavioral task
behavioral1
Sample
ccc5ab19ee37bdeb9d56e090988b51e405f933105994ec0f533f38690681e090.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccc5ab19ee37bdeb9d56e090988b51e405f933105994ec0f533f38690681e090.dll
Resource
win10v2004-20220901-en
General
-
Target
ccc5ab19ee37bdeb9d56e090988b51e405f933105994ec0f533f38690681e090
-
Size
491KB
-
MD5
14d933b7a5a45ec6c09af95f1e473470
-
SHA1
29e72b695443ef078e91b8b0a0100fb5655c3cb2
-
SHA256
ccc5ab19ee37bdeb9d56e090988b51e405f933105994ec0f533f38690681e090
-
SHA512
a8b96d381010b6ffcdb16dc5eff63d8be153eef34faf764403b4b43040f1273e6f7f0db10ba6ecff9198a701a74c71c7638ae69a6377449eef57f5ca206acf75
-
SSDEEP
6144:MwlBMat5XAz6gXCLyHzw6DvxfprK/HTrWFfVlAMtkv2DOuDhuhT1RuLrVdmFWi25:dZ5K8mvxsqfJVux2rHMmDom2KuY
Malware Config
Signatures
Files
-
ccc5ab19ee37bdeb9d56e090988b51e405f933105994ec0f533f38690681e090.dll windows x86
82984a362a5495889282142920a4223a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DisableThreadLibraryCalls
DisconnectNamedPipe
FatalAppExitW
FindFirstChangeNotificationW
GetConsoleFontSize
GetFileAttributesA
GetFileSize
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsBadHugeWritePtr
IsDebuggerPresent
LocalFree
MapViewOfFileEx
ReadFile
SetEvent
SetHandleCount
SetWaitableTimer
WaitForSingleObject
lstrcpyW
lstrlenA
FindResourceExA
FormatMessageW
FreeLibrary
GetComputerNameW
GetStringTypeW
GetThreadSelectorEntry
GlobalAlloc
GlobalFree
HeapUnlock
IsBadStringPtrA
IsBadWritePtr
IsValidLocale
LoadLibraryW
SetSystemTimeAdjustment
Thread32Next
WaitForDebugEvent
WriteConsoleOutputCharacterW
_lclose
lstrcpynA
GetFileSizeEx
GetLargestConsoleWindowSize
GetStdHandle
LocalAlloc
Sleep
VirtualProtectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
VirtualAlloc
DosDateTimeToFileTime
FindClose
GetConsoleAliasExesW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemInfo
GetSystemTimeAdjustment
GetTickCount
GetTimeZoneInformation
GetVersionExA
GlobalUnlock
IsDBCSLeadByteEx
LocalCompact
LocalReAlloc
MoveFileA
MulDiv
QueryPerformanceCounter
ResumeThread
ScrollConsoleScreenBufferA
SetConsoleMode
SetLocaleInfoA
SetUnhandledExceptionFilter
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
WriteProfileSectionA
CompareFileTime
CompareStringW
CopyFileExA
CreateEventW
CreateFileMappingW
CreateFileW
CreateTapePartition
CreateTimerQueue
EnumResourceTypesW
GetComputerNameExW
GetConsoleAliasA
GetConsoleAliasesW
GetCurrencyFormatA
GetEnvironmentVariableA
GetFileAttributesW
GetFileTime
GetFullPathNameA
GetModuleFileNameW
GetModuleHandleW
GetNamedPipeHandleStateA
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetProcessHeaps
GetSystemTime
GetTapeStatus
GetTimeFormatW
GetVersion
LocalFlags
MapViewOfFile
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PrepareTape
ReadConsoleOutputCharacterA
ReleaseMutex
ReplaceFile
SetConsoleOutputCP
SetMessageWaitingIndicator
SetProcessWorkingSetSize
SignalObjectAndWait
SwitchToFiber
SystemTimeToFileTime
UnmapViewOfFile
VirtualQuery
DuplicateHandle
FreeUserPhysicalPages
HeapWalk
SetLocaleInfoW
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetLastError
GetCurrentThread
GetLocalTime
HeapFree
HeapAlloc
ReadConsoleInputA
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetTimeFormatA
GetDateFormatA
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
VirtualFree
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetLocalTime
GetCommandLineA
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
HeapValidate
SetErrorMode
GetFullPathNameW
GetDriveTypeW
FindFirstFileW
RtlUnwind
InitializeCriticalSectionAndSpinCount
FatalAppExitA
HeapCreate
HeapDestroy
GetModuleFileNameA
RaiseException
GetConsoleCP
FlushFileBuffers
HeapSize
SetConsoleCtrlHandler
LoadLibraryA
ReadConsoleA
ReadConsoleW
ReadConsoleInputW
SetFilePointer
GetFileInformationByHandle
PeekNamedPipe
GetStringTypeA
CompareStringA
LCMapStringA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetExitCodeProcess
CreateProcessW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
SetFileTime
LocalFileTimeToFileTime
CreateProcessA
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
FlashWindow
MonitorFromWindow
SwapMouseButton
AnyPopup
CloseWindow
DdeAccessData
DdeConnectList
EnumDisplaySettingsW
FindWindowExA
GetClassInfoExA
GetUserObjectInformationW
GetWindowThreadProcessId
InternalGetWindowText
IsCharAlphaW
LoadCursorW
MessageBoxW
SetMenuItemInfoA
SetUserObjectInformationA
OemToCharBuffA
CharToOemBuffA
CharToOemW
CopyAcceleratorTableW
DialogBoxIndirectParamW
GetListBoxInfo
GetTabbedTextExtentW
IsCharLowerW
IsCharUpperA
RegisterClipboardFormatA
SetClipboardData
SetCursor
TranslateMDISysAccel
UnregisterDeviceNotification
CallWindowProcW
ChangeClipboardChain
ChangeDisplaySettingsExW
CheckDlgButton
CloseDesktop
CopyRect
CreateCaret
CreateIcon
CreateWindowStationA
DlgDirListA
DrawIconEx
FindWindowA
GetCursor
GetInputDesktop
GetKeyNameTextW
GetMonitorInfoW
GetParent
GetPropA
GetUpdateRect
GetUpdateRgn
GetWindowContextHelpId
IMPSetIMEA
LoadMenuW
MonitorFromRect
PostMessageW
RegisterClipboardFormatW
ReuseDDElParam
SendDlgItemMessageW
SendIMEMessageExA
SendMessageW
SendNotifyMessageA
SetCaretPos
SetDeskWallpaper
SetProcessWindowStation
UpdateWindow
wsprintfW
SetPropA
Exports
Exports
Sections
.text Size: 373KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ