UtilcrtInit
Static task
static1
Behavioral task
behavioral1
Sample
e0a775e3421fedd0f0081765f2aa0794a77911d5f25d1b41f3ef9ac04513b1c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0a775e3421fedd0f0081765f2aa0794a77911d5f25d1b41f3ef9ac04513b1c5.dll
Resource
win10v2004-20220812-en
General
-
Target
e0a775e3421fedd0f0081765f2aa0794a77911d5f25d1b41f3ef9ac04513b1c5
-
Size
144KB
-
MD5
86e5fbf5c4a499cb14db6e83b60718e0
-
SHA1
bdbfd661f60f95612eee0da6ac0eaefb5def5036
-
SHA256
e0a775e3421fedd0f0081765f2aa0794a77911d5f25d1b41f3ef9ac04513b1c5
-
SHA512
5d0aa8050120bb43d8dcbe91901abbc109c019d2fbcd36568cf72b0c3baec789caa91a9b8e991ceb7e1afc2b207341702408bdfe10cca341659866e06fadf0f0
-
SSDEEP
3072:ByiHpkHEDus98enAYDp5HDsvpAbOhmo1KVasOVoDZ0hS8:BBHpkRmn/p5ovpwFoGOmV3
Malware Config
Signatures
Files
-
e0a775e3421fedd0f0081765f2aa0794a77911d5f25d1b41f3ef9ac04513b1c5.dll windows x86
40cff3c00ba8c6297de13f34cd86f556
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
InterlockedDecrement
LoadLibraryA
GetModuleHandleA
TerminateProcess
LocalFree
WriteProcessMemory
GlobalFree
GetProcessHeap
Sleep
GetLastError
LeaveCriticalSection
GetCommandLineA
GetVolumeInformationA
CreateMutexW
CopyFileA
CloseHandle
GetComputerNameA
ExitProcess
GetProcAddress
GetModuleFileNameA
CreateFileA
CreateFileMappingA
InterlockedCompareExchange
OpenEventA
InterlockedIncrement
CreateDirectoryA
HeapAlloc
OpenFileMappingA
ReadProcessMemory
EnterCriticalSection
UnmapViewOfFile
CreateProcessA
HeapFree
GetCurrentProcess
CreateEventA
GetTickCount
GlobalAlloc
SetLastError
MapViewOfFile
WaitForSingleObject
ole32
CoInitialize
CoCreateInstance
CoUninitialize
OleCreate
OleSetContainedObject
CoSetProxyBlanket
CoCreateGuid
CoTaskMemAlloc
user32
GetWindowLongA
DispatchMessageA
SetTimer
GetWindow
ScreenToClient
RegisterWindowMessageA
PostQuitMessage
GetCursorPos
DefWindowProcA
CreateWindowExA
TranslateMessage
SendMessageA
GetMessageA
GetClassNameA
ClientToScreen
SetWindowsHookExA
KillTimer
SetWindowLongA
UnhookWindowsHookEx
PeekMessageA
GetSystemMetrics
GetWindowThreadProcessId
GetParent
FindWindowA
DestroyWindow
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
SetTokenInformation
DuplicateTokenEx
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
OpenProcessToken
GetUserNameA
RegQueryValueExA
RegCreateKeyExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ