SecurityNetmm
Static task
static1
Behavioral task
behavioral1
Sample
cfa12dd1b144d89ed6ac1ff30b83ddb3eebc86c0b82f5fbfdead04216028e4b1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cfa12dd1b144d89ed6ac1ff30b83ddb3eebc86c0b82f5fbfdead04216028e4b1.dll
Resource
win10v2004-20220812-en
General
-
Target
cfa12dd1b144d89ed6ac1ff30b83ddb3eebc86c0b82f5fbfdead04216028e4b1
-
Size
148KB
-
MD5
d5bfc57fa7e3cabfea534510efd792b4
-
SHA1
33a5bcc0f7c1fc8ef470cb982cfeb766793776d5
-
SHA256
cfa12dd1b144d89ed6ac1ff30b83ddb3eebc86c0b82f5fbfdead04216028e4b1
-
SHA512
520324083c02617742091c2b39d56a44f1720dbbed477d66ad3c3f47bcc30416ffb8c1baf210487d25c55480ce12e78802c9bc32ebcb3348e22e1ef01bbb634c
-
SSDEEP
3072:U5CbU/PW4DVRTA3VosQ6PjfkbXfyx1XQ9r9zWctgpi:ULBVRs3Vos7LkjfQap4Mgw
Malware Config
Signatures
Files
-
cfa12dd1b144d89ed6ac1ff30b83ddb3eebc86c0b82f5fbfdead04216028e4b1.dll windows x86
dd1630647180a0b487341a0aaec31d6a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
CopyFileA
GetCurrentProcess
CreateProcessA
CreateDirectoryA
LoadLibraryA
SetLastError
CreateFileMappingA
WaitForSingleObject
GetProcessHeap
HeapAlloc
HeapFree
InterlockedCompareExchange
OpenEventA
InterlockedDecrement
GetCommandLineA
EnterCriticalSection
InterlockedIncrement
WriteFile
GetProcAddress
GetModuleHandleA
LeaveCriticalSection
CloseHandle
LocalFree
OpenFileMappingA
WriteProcessMemory
ExitProcess
ReadProcessMemory
GlobalFree
CreateFileA
TerminateProcess
GetTickCount
GetVolumeInformationA
CreateEventA
Sleep
CreateMutexW
MapViewOfFile
GlobalAlloc
GetLastError
GetModuleFileNameA
UnmapViewOfFile
ole32
OleCreate
CoCreateGuid
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
CoSetProxyBlanket
OleSetContainedObject
CoInitialize
user32
CreateWindowExA
ClientToScreen
GetParent
GetWindowThreadProcessId
SetTimer
GetClassNameA
GetSystemMetrics
FindWindowA
DispatchMessageA
ScreenToClient
RegisterWindowMessageA
GetWindow
GetMessageA
DefWindowProcA
GetWindowLongA
SendMessageA
PostQuitMessage
GetCursorPos
UnhookWindowsHookEx
DestroyWindow
PeekMessageA
TranslateMessage
SetWindowLongA
SetWindowsHookExA
KillTimer
oleaut32
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
DuplicateTokenEx
RegQueryValueExA
RegCreateKeyExA
OpenProcessToken
SetTokenInformation
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
GetUserNameA
RegSetValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ