Agereobjplugin
Static task
static1
Behavioral task
behavioral1
Sample
c9bf9d600a5ff7634844a9ec0fd82964932a100451478b6389fe39cd99b7acb9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9bf9d600a5ff7634844a9ec0fd82964932a100451478b6389fe39cd99b7acb9.dll
Resource
win10v2004-20220901-en
General
-
Target
c9bf9d600a5ff7634844a9ec0fd82964932a100451478b6389fe39cd99b7acb9
-
Size
156KB
-
MD5
f5d6071253a11e6d3885256fb26932aa
-
SHA1
ddfd36a7cda8bd9b746e16e0f339a9b2ebf7f124
-
SHA256
c9bf9d600a5ff7634844a9ec0fd82964932a100451478b6389fe39cd99b7acb9
-
SHA512
7b067e0c53b6ada501f9b24a95720e4af78f5008b6cfc5cfbcfbb4ddb94c83597f90b8c451b2486c825077e26e3f0b0e7450617a802d0ff9f80b27d427074344
-
SSDEEP
3072:KbPkzgAc+8+iMqFFDLHv3xfjN4bahzCeZjv227tNAV8etRz:KT61iD7v3xfhgahmYj3tNSL
Malware Config
Signatures
Files
-
c9bf9d600a5ff7634844a9ec0fd82964932a100451478b6389fe39cd99b7acb9.dll windows x86
10983ae59c32797f9fe1197c2ce647db
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateFileMappingA
LocalFree
LoadLibraryA
Sleep
OpenFileMappingA
LeaveCriticalSection
CreateEventA
GetCurrentProcess
CloseHandle
GlobalAlloc
CreateDirectoryA
GetModuleFileNameA
ExitProcess
GetProcessHeap
InterlockedCompareExchange
UnmapViewOfFile
WaitForSingleObject
InterlockedIncrement
GetVolumeInformationA
CopyFileA
CreateProcessA
SetLastError
GetTickCount
InterlockedDecrement
MapViewOfFile
GetProcAddress
CreateFileA
WriteProcessMemory
EnterCriticalSection
TerminateProcess
CreateMutexW
GetModuleHandleA
HeapAlloc
ReadProcessMemory
GetComputerNameA
GetCommandLineA
OpenEventA
HeapFree
WriteFile
GlobalFree
ole32
CoTaskMemAlloc
CoCreateGuid
OleCreate
OleSetContainedObject
CoInitialize
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
user32
DispatchMessageA
KillTimer
GetWindow
RegisterWindowMessageA
TranslateMessage
SetTimer
DestroyWindow
SendMessageA
GetWindowLongA
ClientToScreen
GetMessageA
GetSystemMetrics
GetParent
PostQuitMessage
GetWindowThreadProcessId
PeekMessageA
DefWindowProcA
SetWindowLongA
GetCursorPos
CreateWindowExA
FindWindowA
GetClassNameA
SetWindowsHookExA
ScreenToClient
UnhookWindowsHookEx
oleaut32
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
DuplicateTokenEx
SetTokenInformation
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegCreateKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ldxfvjk Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ