olemap80
Static task
static1
Behavioral task
behavioral1
Sample
c297a6c87b84f54cca2e4586fee66dabad9ed83e73fe30821c1e6fe39cb54260.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c297a6c87b84f54cca2e4586fee66dabad9ed83e73fe30821c1e6fe39cb54260.dll
Resource
win10v2004-20220812-en
General
-
Target
c297a6c87b84f54cca2e4586fee66dabad9ed83e73fe30821c1e6fe39cb54260
-
Size
156KB
-
MD5
2b6d8b68b916acfc4e55f80abda2484e
-
SHA1
36811e69537d6ae2e5629e28678908eaf2d16c50
-
SHA256
c297a6c87b84f54cca2e4586fee66dabad9ed83e73fe30821c1e6fe39cb54260
-
SHA512
027f676370e449c11aa83d378410e4f3c89c9a3c685f4f2262b65de0243b5125caacfcbcbe83a1f8a9870a6879e7637aa26ae3395e076e88185ef0e2791c7f3a
-
SSDEEP
3072:Rcjc6huW5BaBZH/ahIf4XaLA7dB0DTrgN9KC1meOV08wI5xY9/62QS7o:Yc6hxayhs4IA7EjxcOZwIs9h
Malware Config
Signatures
Files
-
c297a6c87b84f54cca2e4586fee66dabad9ed83e73fe30821c1e6fe39cb54260.dll windows x86
22be98baf16efebe240e2fbfaa816b8a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
SetLastError
EnterCriticalSection
HeapFree
InterlockedCompareExchange
CreateDirectoryA
LoadLibraryA
WriteProcessMemory
GetModuleHandleA
ReadProcessMemory
CreateProcessA
GetCurrentProcess
OpenEventA
ExitProcess
CloseHandle
CreateEventA
WaitForSingleObject
GetTickCount
GetModuleFileNameA
InterlockedIncrement
GetVolumeInformationA
Sleep
GlobalAlloc
HeapAlloc
CreateMutexW
CreateFileMappingA
GetProcAddress
InterlockedDecrement
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
LeaveCriticalSection
GetProcessHeap
WriteFile
LocalFree
CreateFileA
GetComputerNameA
GlobalFree
CopyFileA
GetLastError
GetCommandLineA
ole32
OleSetContainedObject
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
OleCreate
CoCreateGuid
CoInitialize
CoTaskMemAlloc
user32
ScreenToClient
UnhookWindowsHookEx
KillTimer
DispatchMessageA
GetClassNameA
GetSystemMetrics
SendMessageA
GetCursorPos
DestroyWindow
SetTimer
SetWindowsHookExA
SetWindowLongA
FindWindowA
PostQuitMessage
TranslateMessage
GetMessageA
CreateWindowExA
DefWindowProcA
GetParent
GetWindow
GetWindowLongA
ClientToScreen
RegisterWindowMessageA
GetWindowThreadProcessId
PeekMessageA
oleaut32
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
SetTokenInformation
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
GetUserNameA
OpenProcessToken
DuplicateTokenEx
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
umukvns Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ