EEGetModuleInterop
Static task
static1
Behavioral task
behavioral1
Sample
a4592575868934deb1a736128c67191038f5a742d6dd80d14c4213002c7d6222.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4592575868934deb1a736128c67191038f5a742d6dd80d14c4213002c7d6222.dll
Resource
win10v2004-20220812-en
General
-
Target
a4592575868934deb1a736128c67191038f5a742d6dd80d14c4213002c7d6222
-
Size
284KB
-
MD5
384af992a7494f7a16e36fa64bccce00
-
SHA1
8a556cc2c14afd6c37ac4d2368d1654569fe06cf
-
SHA256
a4592575868934deb1a736128c67191038f5a742d6dd80d14c4213002c7d6222
-
SHA512
1e092fac26eaf001cde4a8758ac1078bd3e5ebc5a1065ad0fb5b980d05779b13442eea4be87d41346a10f4efe952ea7ed965d760a3e41f311faa1b475a96d9d3
-
SSDEEP
6144:621cvgLqiC8SinTYxFarCMncF5v85U9nXsrG1:621xqiC8xTYxP9B9Xt
Malware Config
Signatures
Files
-
a4592575868934deb1a736128c67191038f5a742d6dd80d14c4213002c7d6222.dll windows x86
993b6d69798fc896b9f813f088d3086b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
GetLastError
SetLastError
SetEvent
ResetEvent
InterlockedCompareExchange
GetCurrentThreadId
CompareStringA
GetCommandLineA
GetVersionExA
RtlUnwind
HeapAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
FreeLibrary
FlushFileBuffers
GetSystemInfo
VirtualProtect
SetStdHandle
GetStringTypeA
GetLocaleInfoA
LCMapStringA
SetFilePointer
InitializeCriticalSection
GetOEMCP
GetACP
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualQuery
WriteFile
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStrings
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
CloseHandle
xprt5
_XprtDestroyThread@8
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
??0TPtrArray@XPRT@@QAE@XZ
?Lock@TSpinLock@XPRT@@QAEXXZ
?Unlock@TSpinLock@XPRT@@QAEXXZ
_XprtUninitialize@0
_XprtInitialize@8
xprt_strlen
xprt_memcpy
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
?Append@TBstr@XPRT@@QAEAAV12@G@Z
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
??0TMessageDigest@XPRT@@QAE@XZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?DirSpecFromFullSpec@TFile@XPRT@@SA?AVTBstr@2@PBG@Z
?Add@TPtrArray@XPRT@@QAEHPAX@Z
?GetAt@TBstr@XPRT@@QBEGH@Z
xprt_iswdigit
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
_XprtCreateThread@8
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
xprt_memset
xprt_memmove
xprt_strcmp
_XprtAtomicDecrement@4
_XprtAtomicIncrement@4
_XprtStringToUtf8@16
_XprtStringUtf8ByteLen@8
?ReverseFind@TBstr@XPRT@@QBEHG@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
_XprtGetMilliseconds@0
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
_XprtHashString@4
_XprtCompareString@8
_XprtFreeString@4
_XprtAllocString@4
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
??1TPtrFromPtrMap@XPRT@@QAE@XZ
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
kUtf8Encoding
?Append@TBstr@XPRT@@QAEAAV12@PBDHPBG@Z
_XprtMemAlloc@4
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
??1TPtrArray@XPRT@@QAE@XZ
?GetTickCount@TTime@XPRT@@SA?AV12@XZ
?AppendFormat@TBstr@XPRT@@QAAXPBGZZ
??0TFile@XPRT@@QAE@XZ
??1TFile@XPRT@@UAE@XZ
?IsOpen@TFile@XPRT@@QBE_NXZ
?Open@TFile@XPRT@@QAE_NPBGI_N@Z
?Find@TBstr@XPRT@@QBEHGH@Z
_XprtMemRealloc@8
?IsEmpty@TBstr@XPRT@@QBE_NXZ
?GetLength@TBstr@XPRT@@QBEHXZ
??0TBstr@XPRT@@QAE@PBDPBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
_XprtMemFree@4
?Detach@TBstr@XPRT@@QAEPAGXZ
??0TBstr@XPRT@@QAE@XZ
?Attach@TBstr@XPRT@@QAEXPAG@Z
?GetTime64@TTime@XPRT@@QBE_JXZ
?Compare@TBstr@XPRT@@QBEHPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
kSystemEncoding
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
?GetString@TBstr@XPRT@@QBEPBGXZ
??0TBstr@XPRT@@QAE@PBG@Z
??1TBstr@XPRT@@QAE@XZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
user32
MsgWaitForMultipleObjects
KillTimer
SetTimer
TranslateMessage
ole32
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
CreateBindCtx
CoInitializeEx
oleaut32
VariantCopy
SysAllocString
VariantChangeType
VariantInit
SafeArrayDestroy
SafeArrayCopy
SafeArrayLock
SafeArrayCreate
SafeArrayUnlock
SafeArrayUnaccessData
SafeArrayGetElement
SafeArrayPutElement
SafeArrayRedim
VariantClear
Exports
Exports
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE