tcpCommonAgent
Static task
static1
Behavioral task
behavioral1
Sample
dbd64c8ea33b290d6d58d1a48875cc87af9ca76d7e9c6f6b4a68f9bb85b4d1b2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dbd64c8ea33b290d6d58d1a48875cc87af9ca76d7e9c6f6b4a68f9bb85b4d1b2.dll
Resource
win10v2004-20221111-en
General
-
Target
dbd64c8ea33b290d6d58d1a48875cc87af9ca76d7e9c6f6b4a68f9bb85b4d1b2
-
Size
160KB
-
MD5
e93a926f6c10423d7d75b85a9673388e
-
SHA1
2cce194fe21787034b8371ec780fcaee14a97d83
-
SHA256
dbd64c8ea33b290d6d58d1a48875cc87af9ca76d7e9c6f6b4a68f9bb85b4d1b2
-
SHA512
84d4edc2591360636c1f5102434a5121761abfffbb6a3a5fb17979f6d6dd245375e8bc74efddf9df27ffe2b0348449bc059bd976d0f5e4cbb2ff0eac91e2902e
-
SSDEEP
3072:AiFLadrKqTdUtzV9TM7L+dQqqsCLPlE81Xr5S1Vv4qfJOG7WS:tFLaAWic7/s6VbUrJOC
Malware Config
Signatures
Files
-
dbd64c8ea33b290d6d58d1a48875cc87af9ca76d7e9c6f6b4a68f9bb85b4d1b2.dll windows x86
3aac83d21a0c555c3ed4dc828de3d059
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
WriteFile
SetLastError
CreateFileMappingA
CreateMutexW
CloseHandle
UnmapViewOfFile
ExitProcess
GetCurrentProcess
WaitForSingleObject
LocalFree
GetVolumeInformationA
GlobalAlloc
CreateProcessA
HeapAlloc
LoadLibraryA
CreateDirectoryA
InterlockedCompareExchange
OpenFileMappingA
GlobalFree
CreateFileA
OpenEventA
GetComputerNameA
MapViewOfFile
EnterCriticalSection
GetProcessHeap
HeapFree
GetCommandLineA
GetModuleHandleA
WriteProcessMemory
TerminateProcess
GetModuleFileNameA
CopyFileA
GetLastError
ReadProcessMemory
LeaveCriticalSection
CreateEventA
GetTickCount
GetProcAddress
InterlockedDecrement
Sleep
ole32
CoSetProxyBlanket
CoInitialize
OleSetContainedObject
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
OleCreate
CoUninitialize
user32
SendMessageA
GetCursorPos
SetWindowsHookExA
DestroyWindow
GetWindow
ClientToScreen
FindWindowA
SetWindowLongA
ScreenToClient
PeekMessageA
KillTimer
GetSystemMetrics
DefWindowProcA
DispatchMessageA
TranslateMessage
SetTimer
GetParent
GetWindowThreadProcessId
GetWindowLongA
GetClassNameA
GetMessageA
PostQuitMessage
UnhookWindowsHookEx
RegisterWindowMessageA
CreateWindowExA
oleaut32
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteValueA
RegSetValueExA
DuplicateTokenEx
RegDeleteKeyA
GetUserNameA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
OpenProcessToken
RegOpenKeyExA
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kzx Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ