DesktopmapTask
Static task
static1
Behavioral task
behavioral1
Sample
e43776e97a3f85ba3c5e55fda29cc2d64563b64ac99e47d9cd8f90ed4df8be0a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e43776e97a3f85ba3c5e55fda29cc2d64563b64ac99e47d9cd8f90ed4df8be0a.dll
Resource
win10v2004-20220901-en
General
-
Target
e43776e97a3f85ba3c5e55fda29cc2d64563b64ac99e47d9cd8f90ed4df8be0a
-
Size
156KB
-
MD5
78cb2fca74c1e9230b48ccf0e9e2d98f
-
SHA1
2d0f8647d3f107dc418b3d361f2d310d45358f58
-
SHA256
e43776e97a3f85ba3c5e55fda29cc2d64563b64ac99e47d9cd8f90ed4df8be0a
-
SHA512
9695304dc444c06b02531c51622a02b75097698b9bc4ff57f43c2c06f49f294aca369605da4a8fd838137fd3eb0fe7ede4b273f12f07e25545b4296526707f37
-
SSDEEP
3072:vPZ3jqckm2wPN/c924It7kkZqRWhAcmv:3hDg0SzCS
Malware Config
Signatures
Files
-
e43776e97a3f85ba3c5e55fda29cc2d64563b64ac99e47d9cd8f90ed4df8be0a.dll windows x86
1931de07c285e3c3b5fbbd771f6595ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetComputerNameA
GetVolumeInformationA
GetModuleHandleA
ReadProcessMemory
GetProcAddress
HeapAlloc
TerminateProcess
Sleep
WriteProcessMemory
CreateFileMappingA
OpenEventA
LoadLibraryA
LocalFree
InterlockedIncrement
CloseHandle
WriteFile
OpenFileMappingA
HeapFree
CreateDirectoryA
LeaveCriticalSection
GlobalAlloc
InterlockedCompareExchange
MapViewOfFile
CreateFileA
GetLastError
GetCurrentProcess
CreateMutexW
SetLastError
GetTickCount
GlobalFree
InterlockedDecrement
GetCommandLineA
UnmapViewOfFile
EnterCriticalSection
ExitProcess
CopyFileA
CreateProcessA
GetProcessHeap
CreateEventA
GetModuleFileNameA
ole32
CoInitialize
OleSetContainedObject
CoTaskMemAlloc
OleCreate
CoCreateInstance
CoCreateGuid
CoUninitialize
CoSetProxyBlanket
user32
CreateWindowExA
ClientToScreen
DestroyWindow
SetWindowLongA
DispatchMessageA
PostQuitMessage
PeekMessageA
SetWindowsHookExA
GetCursorPos
TranslateMessage
FindWindowA
GetSystemMetrics
UnhookWindowsHookEx
GetWindow
GetWindowThreadProcessId
SetTimer
RegisterWindowMessageA
DefWindowProcA
ScreenToClient
KillTimer
GetParent
GetMessageA
SendMessageA
GetWindowLongA
GetClassNameA
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
SysStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
RegCreateKeyExA
SetTokenInformation
RegDeleteValueA
OpenProcessToken
RegSetValueExA
DuplicateTokenEx
RegDeleteKeyA
RegCloseKey
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dmqnht Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ