nsMainclass
Static task
static1
Behavioral task
behavioral1
Sample
f106a15f14e42f984a7fbdc19476809449d97c20be0983d0a05023c888ef6458.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f106a15f14e42f984a7fbdc19476809449d97c20be0983d0a05023c888ef6458.dll
Resource
win10v2004-20220901-en
General
-
Target
f106a15f14e42f984a7fbdc19476809449d97c20be0983d0a05023c888ef6458
-
Size
152KB
-
MD5
c0a1d562902c05182be53d19b651155e
-
SHA1
448fe829a8d87af28b57044126888b2caf4fc8fd
-
SHA256
f106a15f14e42f984a7fbdc19476809449d97c20be0983d0a05023c888ef6458
-
SHA512
1638e82a5d59a19c444d60c4e9bd05009876a0c26c3bc516f98ea8475d6123f2ef9eaa3625559ec30ceae402493ece3693a866e42b1046165d241fcca49b2874
-
SSDEEP
3072:noGywF4mIR4f/tDkD0TX1dp+J9KTd0yAQQMitvk+haDSZr6RDjg7puRMvJT:GD8/U0T5+J9KTlAYPsaWIoQ4J
Malware Config
Signatures
Files
-
f106a15f14e42f984a7fbdc19476809449d97c20be0983d0a05023c888ef6458.dll windows x86
7f49b6467731a21d19bf27a144cabe21
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
Sleep
OpenEventA
CreateMutexW
InterlockedDecrement
WaitForSingleObject
GetModuleFileNameA
GetLastError
GetComputerNameA
CreateDirectoryA
WriteFile
SetLastError
ExitProcess
CreateEventA
LoadLibraryA
HeapFree
CopyFileA
InterlockedIncrement
UnmapViewOfFile
TerminateProcess
GetCurrentProcess
GetProcessHeap
GetVolumeInformationA
GetModuleHandleA
CreateFileMappingA
LocalFree
GetProcAddress
ReadProcessMemory
InterlockedCompareExchange
GlobalFree
GlobalAlloc
WriteProcessMemory
CreateFileA
GetTickCount
EnterCriticalSection
GetCommandLineA
OpenFileMappingA
HeapAlloc
CloseHandle
MapViewOfFile
LeaveCriticalSection
ole32
CoSetProxyBlanket
CoCreateInstance
OleCreate
CoCreateGuid
OleSetContainedObject
CoUninitialize
CoTaskMemAlloc
CoInitialize
user32
SetTimer
PostQuitMessage
ScreenToClient
GetMessageA
SetWindowsHookExA
RegisterWindowMessageA
KillTimer
GetWindow
ClientToScreen
FindWindowA
SetWindowLongA
GetClassNameA
DefWindowProcA
DispatchMessageA
GetCursorPos
PeekMessageA
TranslateMessage
GetWindowLongA
CreateWindowExA
GetParent
UnhookWindowsHookEx
DestroyWindow
SendMessageA
GetSystemMetrics
GetWindowThreadProcessId
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
SysStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
GetUserNameA
OpenProcessToken
DuplicateTokenEx
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
SetTokenInformation
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 969B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ