UseCreotmkra
Behavioral task
behavioral1
Sample
ca5854fd8b180797943a08354bd12b5c2f236fb44d21e954009928e5b815bb0a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca5854fd8b180797943a08354bd12b5c2f236fb44d21e954009928e5b815bb0a.dll
Resource
win10v2004-20221111-en
General
-
Target
ca5854fd8b180797943a08354bd12b5c2f236fb44d21e954009928e5b815bb0a
-
Size
156KB
-
MD5
a0bf0abfbc2319efbaf99b5cc402c659
-
SHA1
be7a2a5d7a06ed336f41c0a862310b3952f86926
-
SHA256
ca5854fd8b180797943a08354bd12b5c2f236fb44d21e954009928e5b815bb0a
-
SHA512
04dfc880ae6ba16fd0784f15e2a30a175da5a86e94f61e72a861e697729ddddac03c58381670e8ab1f21c6335cbae477aa78f524bdb033483caca55b83de512b
-
SSDEEP
3072:eyjNO0zYRNfIZu0tVaYxcSe/Qd97ADGlW1b+WxqGNA:e30Ujb0tVaYxjR9UDG2b+GA
Malware Config
Signatures
Files
-
ca5854fd8b180797943a08354bd12b5c2f236fb44d21e954009928e5b815bb0a.dll windows x86
4be54fa93239a8572a0533e12e59ed79
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_initterm
memmove
modf
malloc
free
strrchr
??2@YAPAXI@Z
strtod
sprintf
strncpy
floor
_strnicmp
??3@YAXPAX@Z
_CIfmod
_CIpow
strncmp
toupper
atoi
_ftol
srand
kernel32
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LCMapStringA
GetCommandLineA
CopyFileA
GetTickCount
SetFileAttributesA
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
OpenProcess
CloseHandle
CreateThread
TerminateProcess
LoadLibraryA
ReadProcessMemory
VirtualQuery
VirtualProtect
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
ResumeThread
GetExitCodeThread
FreeLibrary
CreateToolhelp32Snapshot
Module32First
Module32Next
GetExitCodeProcess
GetVersionExA
GetCurrentThreadId
QueryPerformanceFrequency
GetCurrentProcess
GetModuleFileNameA
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetCurrentDirectoryA
GetPrivateProfileStringA
Sleep
WritePrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
user32
EnumWindows
MessageBoxA
FindWindowExA
GetParent
GetAncestor
SetTimer
ShowWindow
PostMessageA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
ws2_32
send
shlwapi
StrToInt64ExA
psapi
GetModuleFileNameExA
ntdll
ZwResumeProcess
ole32
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
CLSIDFromProgID
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
SysAllocString
SafeArrayCreate
VariantClear
SafeArrayDestroy
RegisterTypeLi
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ