xpMaphid
Static task
static1
Behavioral task
behavioral1
Sample
8f4a0bf7dec8c5cb6bc78f1728a3da47667219c594467c4110e5d972b2df20cd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f4a0bf7dec8c5cb6bc78f1728a3da47667219c594467c4110e5d972b2df20cd.dll
Resource
win10v2004-20220812-en
General
-
Target
8f4a0bf7dec8c5cb6bc78f1728a3da47667219c594467c4110e5d972b2df20cd
-
Size
148KB
-
MD5
b1da65acae3a68858a6102643e1ad587
-
SHA1
5f71269aa042d2f39dc546f74ee9af2e83353487
-
SHA256
8f4a0bf7dec8c5cb6bc78f1728a3da47667219c594467c4110e5d972b2df20cd
-
SHA512
36b552b6bd8031e8e0ec4c07bbf61fb47fbf9dee6a14cd1f59d5ed7a9297a03ce93e663ab4beaab920bdeb29f4cd6b343971dece4ab65e9c80159235092b079b
-
SSDEEP
3072:qa46AW1oqrf1kStyq51A6uOe3NOnNmt4Q:p4mdkStvEO+Q8
Malware Config
Signatures
Files
-
8f4a0bf7dec8c5cb6bc78f1728a3da47667219c594467c4110e5d972b2df20cd.dll windows x86
80983e449bd2f8f0c5fa4d6754518766
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetModuleFileNameA
GetCurrentProcess
SetLastError
GlobalAlloc
InterlockedCompareExchange
GetTickCount
TerminateProcess
CreateFileMappingA
GlobalFree
WriteFile
CreateEventA
InterlockedIncrement
CreateFileA
WriteProcessMemory
WaitForSingleObject
CopyFileA
CreateMutexW
GetModuleHandleA
LeaveCriticalSection
ReadProcessMemory
MapViewOfFile
Sleep
LocalFree
UnmapViewOfFile
GetProcessHeap
HeapFree
CreateDirectoryA
GetComputerNameA
LoadLibraryA
GetLastError
OpenEventA
GetVolumeInformationA
ExitProcess
EnterCriticalSection
CreateProcessA
GetProcAddress
OpenFileMappingA
GetCommandLineA
HeapAlloc
InterlockedDecrement
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
OleCreate
CoTaskMemAlloc
OleSetContainedObject
user32
CreateWindowExA
GetParent
GetCursorPos
GetWindowLongA
PeekMessageA
SendMessageA
UnhookWindowsHookEx
DefWindowProcA
SetTimer
GetWindowThreadProcessId
PostQuitMessage
GetWindow
SetWindowsHookExA
ClientToScreen
GetMessageA
DispatchMessageA
GetClassNameA
KillTimer
FindWindowA
ScreenToClient
SetWindowLongA
DestroyWindow
GetSystemMetrics
TranslateMessage
RegisterWindowMessageA
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegCreateKeyExA
DuplicateTokenEx
RegOpenKeyExA
RegDeleteKeyA
GetUserNameA
RegCloseKey
RegSetValueExA
OpenProcessToken
RegDeleteValueA
RegQueryValueExA
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eotq Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ