winMobilespl
Static task
static1
Behavioral task
behavioral1
Sample
ccc66424de1cb2f63aedbe939cf1ed6e754eafbc5fc9bfbe9fab67f1378532d4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccc66424de1cb2f63aedbe939cf1ed6e754eafbc5fc9bfbe9fab67f1378532d4.dll
Resource
win10v2004-20221111-en
General
-
Target
ccc66424de1cb2f63aedbe939cf1ed6e754eafbc5fc9bfbe9fab67f1378532d4
-
Size
152KB
-
MD5
e8438345b321729fd2c7ad8b51fabf96
-
SHA1
4bce0f5da0c280c7922bb4fde2840bf5420752c1
-
SHA256
ccc66424de1cb2f63aedbe939cf1ed6e754eafbc5fc9bfbe9fab67f1378532d4
-
SHA512
2f49688d4369386a85412db7938b9ed1cc7b4080d062b82754afc8e84898c898eb8e3a4aeb51b8cbf42ae0214fd84d9c4b4ca0ca6b4223f302ddda80b9fc2f99
-
SSDEEP
3072:DCMHGqPymCMl/R/UGA0XLgm0mQwFbC6SNNMHBdSDMgzOL:DCbq0Ad3D1Ic/SDMD
Malware Config
Signatures
Files
-
ccc66424de1cb2f63aedbe939cf1ed6e754eafbc5fc9bfbe9fab67f1378532d4.dll windows x86
ad1db4fc70384b778a8c9b103e5ba8dc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
GlobalFree
Sleep
InterlockedDecrement
CreateMutexW
WriteFile
LocalFree
WriteProcessMemory
InterlockedIncrement
LoadLibraryA
HeapFree
EnterCriticalSection
GetCurrentProcess
GetVolumeInformationA
LeaveCriticalSection
CloseHandle
GetProcAddress
GetTickCount
CreateProcessA
GetProcessHeap
GetComputerNameA
GetModuleHandleA
InterlockedCompareExchange
CreateEventA
CreateFileMappingA
ReadProcessMemory
HeapAlloc
GetModuleFileNameA
CreateFileA
TerminateProcess
SetLastError
GetLastError
GlobalAlloc
CopyFileA
OpenEventA
UnmapViewOfFile
ExitProcess
GetCommandLineA
OpenFileMappingA
WaitForSingleObject
CreateDirectoryA
ole32
OleCreate
CoSetProxyBlanket
CoInitialize
CoTaskMemAlloc
CoCreateGuid
CoCreateInstance
CoUninitialize
OleSetContainedObject
user32
GetMessageA
GetWindowLongA
DispatchMessageA
GetSystemMetrics
GetWindow
SetWindowLongA
UnhookWindowsHookEx
PostQuitMessage
GetParent
SendMessageA
SetTimer
KillTimer
PeekMessageA
DestroyWindow
TranslateMessage
GetCursorPos
GetClassNameA
DefWindowProcA
RegisterWindowMessageA
CreateWindowExA
SetWindowsHookExA
FindWindowA
ScreenToClient
ClientToScreen
GetWindowThreadProcessId
oleaut32
SysStringLen
SysAllocStringLen
SysFreeString
SysAllocString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteKeyA
RegDeleteValueA
GetUserNameA
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
SetTokenInformation
DuplicateTokenEx
RegSetValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ