CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
c712cef5c9a4cc781654385a513da099a3d2455979c2b188583db3ffd0b51fe3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c712cef5c9a4cc781654385a513da099a3d2455979c2b188583db3ffd0b51fe3.dll
Resource
win10v2004-20220812-en
General
-
Target
c712cef5c9a4cc781654385a513da099a3d2455979c2b188583db3ffd0b51fe3
-
Size
84KB
-
MD5
a5c16589dc20b2b80c5928f1263385d4
-
SHA1
0949f537b26034cac812a990e9b411c1640a680a
-
SHA256
c712cef5c9a4cc781654385a513da099a3d2455979c2b188583db3ffd0b51fe3
-
SHA512
facf94849817e2e4d3d690981466e35976ae389e2f38c857738fb415f689cdd4b6f3d524bd0ad68a1ca632f4336be82933dc13a075a2e86717ed7504da99076a
-
SSDEEP
1536:+YSLB8UFAnwQTqw4ncUvnjU84MbVszQRtWldVor:+YGBjen/43vnjU84MbVszQRtWldVw
Malware Config
Signatures
Files
-
c712cef5c9a4cc781654385a513da099a3d2455979c2b188583db3ffd0b51fe3.dll windows x86
482a8795f8a58671cbc9909395754982
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExA
CancelWaitableTimer
GlobalGetAtomNameA
ReleaseActCtx
OpenThread
GetFullPathNameA
OpenEventW
OpenMutexW
DeleteTimerQueue
MoveFileA
GetThreadTimes
CreateFileW
EndUpdateResourceA
SetFileApisToOEM
GetWindowsDirectoryW
VerifyVersionInfoW
FlushViewOfFile
TransactNamedPipe
SuspendThread
GetComputerNameA
TerminateThread
PeekNamedPipe
CreateMutexA
GetFileTime
WriteFileEx
GetFileInformationByHandle
FileTimeToDosDateTime
AddAtomA
RegisterWaitForSingleObjectEx
GetVolumePathNamesForVolumeNameW
GetExitCodeThread
CreateProcessW
GetProcessAffinityMask
CreateWaitableTimerW
SwitchToThread
ReadDirectoryChangesW
IsBadHugeReadPtr
GetFileType
AreFileApisANSI
FreeConsole
SetConsoleCursorPosition
WaitNamedPipeW
TryEnterCriticalSection
GetCurrentProcess
GlobalGetAtomNameW
HeapReAlloc
FindResourceW
GetProcessVersion
CreateJobObjectW
CallNamedPipeA
IsBadWritePtr
FindNextVolumeMountPointW
lstrcatW
CreateTimerQueueTimer
EnumResourceNamesA
WaitCommEvent
VirtualAlloc
SetStdHandle
CancelIo
WaitForMultipleObjectsEx
CreateTimerQueue
SetVolumeMountPointW
FindActCtxSectionGuid
FindFirstVolumeMountPointW
GetCommTimeouts
IsBadReadPtr
SetComputerNameExW
SetConsoleCtrlHandler
GetCommState
GetVolumeNameForVolumeMountPointW
GetCalendarInfoW
LocalFlags
GetProfileIntA
GetLocalTime
BindIoCompletionCallback
FindActCtxSectionStringW
MapViewOfFileEx
GetSystemDefaultLangID
UnregisterWait
SetFileAttributesA
InterlockedDecrement
MapViewOfFile
lstrlenW
UnmapViewOfFile
CreateProcessA
EnterCriticalSection
CreateFileA
GetProcAddress
CreateEventA
CreateDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcessHeap
CloseHandle
OpenEventA
InterlockedCompareExchange
SetLastError
VirtualProtect
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetConsoleScreenBufferInfo
ole32
CoReleaseMarshalData
CoDisableCallCancellation
CoGetMalloc
CoDisconnectObject
OleDoAutoConvert
CoEnableCallCancellation
OleCreate
CoCreateFreeThreadedMarshaler
StgOpenStorage
OleSetMenuDescriptor
CoFileTimeNow
OleCreateLink
StringFromGUID2
CoAddRefServerProcess
CreateDataAdviseHolder
CoMarshalInterThreadInterfaceInStream
OleLoadFromStream
CoSwitchCallContext
OleCreateLinkToFile
CoSetProxyBlanket
CreatePointerMoniker
CLSIDFromString
CoTaskMemFree
StgOpenStorageOnILockBytes
user32
PeekMessageA
LoadIconA
GetClassInfoW
UnregisterClassW
SetSysColors
SetWindowPos
wvsprintfA
UnpackDDElParam
OpenWindowStationW
SetWindowTextW
GetWindowInfo
MsgWaitForMultipleObjectsEx
AttachThreadInput
OemToCharA
GetNextDlgGroupItem
SetProcessWindowStation
ScrollWindow
GetDlgItemTextA
GetMenuItemInfoA
MapVirtualKeyExW
ChangeDisplaySettingsW
SetMenuItemInfoW
CreateIconFromResourceEx
UnregisterHotKey
CharUpperBuffW
CharNextW
DefWindowProcW
WaitForInputIdle
RemoveMenu
ShowOwnedPopups
GetProcessDefaultLayout
GetCursorPos
DispatchMessageW
GetClassInfoExW
SetScrollPos
LoadImageA
DefFrameProcA
GetActiveWindow
IsChild
EnumWindowStationsW
AdjustWindowRectEx
CharUpperBuffA
GetProcessWindowStation
CloseDesktop
SetFocus
SetCursor
IsRectEmpty
ScreenToClient
DialogBoxIndirectParamA
TrackPopupMenuEx
ToUnicodeEx
CreateDialogParamW
EndDeferWindowPos
VkKeyScanA
PostMessageW
FindWindowExW
LoadAcceleratorsW
SetScrollInfo
PostThreadMessageA
TranslateAcceleratorA
wvsprintfW
DestroyMenu
CharPrevW
IsWindowEnabled
SetWindowRgn
WinHelpA
FreeDDElParam
ShowWindowAsync
LoadBitmapA
PtInRect
MonitorFromRect
GetDCEx
SetWindowContextHelpId
OemToCharBuffA
EndTask
ChangeDisplaySettingsExW
SetWindowWord
DestroyIcon
SetWindowsHookExA
UnhookWindowsHookEx
SetTimer
GetClassNameA
CallNextHookEx
advapi32
RegSetValueExA
GetOldestEventLogRecord
RegEnumKeyA
MapGenericMask
RegCreateKeyW
ReadEventLogA
RegEnumValueW
RegUnLoadKeyA
GetServiceKeyNameW
CredFree
CredReadDomainCredentialsW
RegisterServiceCtrlHandlerA
CredDeleteW
RegConnectRegistryW
CredGetSessionTypes
IsTextUnicode
SaferGetPolicyInformation
RegDeleteKeyA
SaferCloseLevel
QueryServiceLockStatusA
RegDeleteKeyW
RegisterServiceCtrlHandlerExW
RegQueryInfoKeyW
ObjectCloseAuditAlarmW
ReportEventW
RegCreateKeyExW
LogonUserA
RegNotifyChangeKeyValue
RegCreateKeyExA
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ