usrGLclass
Static task
static1
Behavioral task
behavioral1
Sample
a585c8108a629ddd7913645a3445b1c7384560cf344ead5f4c424750382a7e7e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a585c8108a629ddd7913645a3445b1c7384560cf344ead5f4c424750382a7e7e.dll
Resource
win10v2004-20220812-en
General
-
Target
a585c8108a629ddd7913645a3445b1c7384560cf344ead5f4c424750382a7e7e
-
Size
152KB
-
MD5
797093e5bccf075dc18de027ccc059d4
-
SHA1
09b52451532d610f0f507a5eeaf8646fd9b9c442
-
SHA256
a585c8108a629ddd7913645a3445b1c7384560cf344ead5f4c424750382a7e7e
-
SHA512
5222cb1df6118dd39ecbc42b83d6cd6123e899b47c4be32e49ad26f1c9134eac210cb9257e72f105ee55da1018a2c3b301d9d097f333bd76fefef6affbc426bf
-
SSDEEP
3072:d/p8hK5fL3ApY6KnjZajETR4O/j6gc+r7FYKKMpr94kFW5N3kFEmRF8ZGQKkp:pp8+fLnAN4pr0IFv3vi
Malware Config
Signatures
Files
-
a585c8108a629ddd7913645a3445b1c7384560cf344ead5f4c424750382a7e7e.dll windows x86
914c687593e23fff6f6c7e4f9f0283b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
UnmapViewOfFile
MapViewOfFile
GetProcAddress
WriteProcessMemory
WaitForSingleObject
LoadLibraryA
InterlockedCompareExchange
CopyFileA
CloseHandle
LeaveCriticalSection
HeapFree
GetComputerNameA
GetTickCount
ExitProcess
CreateFileMappingA
GetProcessHeap
GlobalFree
InterlockedIncrement
CreateFileA
EnterCriticalSection
GetCommandLineA
GetCurrentProcess
GetModuleFileNameA
CreateEventA
Sleep
CreateDirectoryA
ReadProcessMemory
SetLastError
OpenEventA
LocalFree
GetLastError
HeapAlloc
TerminateProcess
GetModuleHandleA
OpenFileMappingA
GlobalAlloc
WriteFile
GetVolumeInformationA
CreateProcessA
CreateMutexW
ole32
CoInitialize
CoTaskMemAlloc
CoCreateGuid
OleSetContainedObject
OleCreate
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
user32
UnhookWindowsHookEx
GetSystemMetrics
KillTimer
SetWindowsHookExA
DestroyWindow
GetCursorPos
GetWindowThreadProcessId
PostQuitMessage
GetWindow
FindWindowA
CreateWindowExA
SetTimer
PeekMessageA
TranslateMessage
ScreenToClient
GetClassNameA
GetWindowLongA
DefWindowProcA
GetParent
ClientToScreen
SetWindowLongA
RegisterWindowMessageA
DispatchMessageA
GetMessageA
SendMessageA
oleaut32
SysStringLen
SysAllocStringLen
SysFreeString
SysAllocString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
DuplicateTokenEx
RegCloseKey
RegCreateKeyExA
OpenProcessToken
SetTokenInformation
RegDeleteKeyA
GetUserNameA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 985B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
erehdn Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ