tcpGLSupport
Static task
static1
Behavioral task
behavioral1
Sample
18f9794ab0efcb8c13c45cf9718a10013e028a9aa3d02419b2f169bf929fb250.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18f9794ab0efcb8c13c45cf9718a10013e028a9aa3d02419b2f169bf929fb250.dll
Resource
win10v2004-20221111-en
General
-
Target
18f9794ab0efcb8c13c45cf9718a10013e028a9aa3d02419b2f169bf929fb250
-
Size
144KB
-
MD5
769dda7adcb1d9f43e70ce8ee17bc0c0
-
SHA1
d09f2ce5eef3c9204e2cc37041fb7873e7b9a5ac
-
SHA256
18f9794ab0efcb8c13c45cf9718a10013e028a9aa3d02419b2f169bf929fb250
-
SHA512
ac5d4cce4649248b57514a2d56386be88b63112dd53dab14dfb6f4ea6a69530d13ef4564a56d0fbdc8fe8f606f3b9fa143eee0ae19d60dc7b56083b8234b36f7
-
SSDEEP
3072:lmIC1o8TVrBwb4ybuHN6Kq7ZrMz3j5Ay14zWhwfjcbv2g9/R21i9:wICaOVrg4/N6K8K3jdh2cyv1i9
Malware Config
Signatures
Files
-
18f9794ab0efcb8c13c45cf9718a10013e028a9aa3d02419b2f169bf929fb250.dll windows x86
5eba24f1611ccb36bfb44874b82c0e52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
InterlockedIncrement
ExitProcess
CreateMutexW
EnterCriticalSection
GetModuleFileNameA
CloseHandle
HeapFree
WaitForSingleObject
CreateDirectoryA
GetCurrentProcess
CreateProcessA
HeapAlloc
CreateFileA
GetCommandLineA
TerminateProcess
GetModuleHandleA
GetVolumeInformationA
CreateFileMappingA
ReadProcessMemory
LocalFree
OpenFileMappingA
LeaveCriticalSection
MapViewOfFile
CreateEventA
GetTickCount
WriteFile
LoadLibraryA
WriteProcessMemory
Sleep
UnmapViewOfFile
CopyFileA
GetComputerNameA
GetProcessHeap
GetLastError
GlobalAlloc
GlobalFree
InterlockedCompareExchange
OpenEventA
SetLastError
GetProcAddress
ole32
CoInitialize
CoCreateGuid
CoUninitialize
CoSetProxyBlanket
OleSetContainedObject
CoCreateInstance
OleCreate
CoTaskMemAlloc
user32
RegisterWindowMessageA
GetCursorPos
GetParent
GetWindow
GetClassNameA
PostQuitMessage
ClientToScreen
GetMessageA
FindWindowA
SetTimer
UnhookWindowsHookEx
PeekMessageA
GetSystemMetrics
SendMessageA
SetWindowsHookExA
TranslateMessage
ScreenToClient
GetWindowLongA
KillTimer
GetWindowThreadProcessId
SetWindowLongA
DispatchMessageA
CreateWindowExA
DestroyWindow
DefWindowProcA
oleaut32
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegDeleteValueA
RegDeleteKeyA
GetUserNameA
RegCloseKey
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
SetTokenInformation
DuplicateTokenEx
RegSetValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ