tcpNetPort
Static task
static1
Behavioral task
behavioral1
Sample
aebc2ca8da215e528af5cc222e38b17a4bffd7827911e35b2eed7cbd0b227b61.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aebc2ca8da215e528af5cc222e38b17a4bffd7827911e35b2eed7cbd0b227b61.dll
Resource
win10v2004-20221111-en
General
-
Target
aebc2ca8da215e528af5cc222e38b17a4bffd7827911e35b2eed7cbd0b227b61
-
Size
148KB
-
MD5
eb0a9432d799d6bcf2844095bc73de96
-
SHA1
642603fa52b4356fe5bbff69fa7a9f78f18062c5
-
SHA256
aebc2ca8da215e528af5cc222e38b17a4bffd7827911e35b2eed7cbd0b227b61
-
SHA512
6b5087a84a23f6743b7f642309edd646bf7fd02aa4f602ba73d020d57cd19fd8e606ba62ce060d814e4a8df5b42caa41c5b1454ec69a135ae8069bbf76a80079
-
SSDEEP
3072:ZyWu3DxKd5lvWakcuO7mPLCUUCMK5Cl77YqSV3d04:ZyWoKd3YqMLCaLxd0
Malware Config
Signatures
Files
-
aebc2ca8da215e528af5cc222e38b17a4bffd7827911e35b2eed7cbd0b227b61.dll windows x86
9f134ba19c1bdb356761f297017785b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
WriteFile
CreateDirectoryA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
InterlockedIncrement
HeapFree
Sleep
LoadLibraryA
GetLastError
WriteProcessMemory
CloseHandle
GlobalAlloc
CreateProcessA
GetModuleFileNameA
OpenEventA
SetLastError
CopyFileA
CreateMutexW
GetModuleHandleA
CreateFileMappingA
GetVolumeInformationA
InterlockedDecrement
OpenFileMappingA
InterlockedCompareExchange
GetCommandLineA
GetProcessHeap
GetComputerNameA
HeapAlloc
UnmapViewOfFile
ReadProcessMemory
CreateEventA
CreateFileA
LocalFree
TerminateProcess
GlobalFree
GetProcAddress
WaitForSingleObject
MapViewOfFile
GetTickCount
ole32
CoSetProxyBlanket
OleCreate
CoTaskMemAlloc
OleSetContainedObject
CoUninitialize
CoCreateGuid
CoInitialize
CoCreateInstance
user32
FindWindowA
DispatchMessageA
GetWindow
TranslateMessage
KillTimer
GetClassNameA
DefWindowProcA
GetParent
DestroyWindow
RegisterWindowMessageA
PostQuitMessage
PeekMessageA
CreateWindowExA
GetCursorPos
UnhookWindowsHookEx
GetMessageA
SetTimer
SetWindowsHookExA
ClientToScreen
SetWindowLongA
GetSystemMetrics
ScreenToClient
GetWindowLongA
SendMessageA
GetWindowThreadProcessId
oleaut32
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegCreateKeyExA
OpenProcessToken
RegCloseKey
RegDeleteKeyA
SetTokenInformation
DuplicateTokenEx
RegOpenKeyExA
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ