uninetVdm
Static task
static1
Behavioral task
behavioral1
Sample
e77d342b9dff3152616ca3a553490e4ae4143ef568c93d34932d18270d5cb0cd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e77d342b9dff3152616ca3a553490e4ae4143ef568c93d34932d18270d5cb0cd.dll
Resource
win10v2004-20220901-en
General
-
Target
e77d342b9dff3152616ca3a553490e4ae4143ef568c93d34932d18270d5cb0cd
-
Size
156KB
-
MD5
071d0882f8dab17bde99ed52512dfdf2
-
SHA1
f16ba081c97106a9a7c15bca2a6fa4c0ffbe663c
-
SHA256
e77d342b9dff3152616ca3a553490e4ae4143ef568c93d34932d18270d5cb0cd
-
SHA512
0899387ddc133034c7bc7a0a007f475f1132744dfa04e0eb51e02c85f5b2c692bef0201eecbf61bf9c8e964fc6551142d414c0f3a168edc3c45f5b5a3991aba5
-
SSDEEP
3072:sty6XYwn1jxuby4sYjEDea7CzalA1ebiofoeN/PVt:Mb3ubvsYjEb7CVeFp1/
Malware Config
Signatures
Files
-
e77d342b9dff3152616ca3a553490e4ae4143ef568c93d34932d18270d5cb0cd.dll windows x86
1e6c791a49441bf1c2dfde16cfdb9ec4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetTickCount
LoadLibraryA
WriteFile
InterlockedDecrement
LocalFree
ReadProcessMemory
GetCurrentProcess
HeapFree
GetModuleHandleA
CreateFileMappingA
OpenEventA
CreateDirectoryA
InterlockedCompareExchange
MapViewOfFile
GetProcessHeap
GetLastError
GetProcAddress
ExitProcess
OpenFileMappingA
CreateMutexW
GetModuleFileNameA
WaitForSingleObject
CreateEventA
GetComputerNameA
HeapAlloc
GetCommandLineA
CreateFileA
CopyFileA
UnmapViewOfFile
GetVolumeInformationA
WriteProcessMemory
TerminateProcess
CreateProcessA
GlobalFree
CloseHandle
SetLastError
InterlockedIncrement
GlobalAlloc
EnterCriticalSection
LeaveCriticalSection
ole32
CoCreateInstance
CoTaskMemAlloc
OleSetContainedObject
CoCreateGuid
CoSetProxyBlanket
CoUninitialize
CoInitialize
OleCreate
user32
ClientToScreen
SetWindowLongA
GetSystemMetrics
PeekMessageA
GetMessageA
DefWindowProcA
KillTimer
ScreenToClient
DestroyWindow
SetWindowsHookExA
GetWindow
GetCursorPos
TranslateMessage
SetTimer
PostQuitMessage
GetWindowLongA
CreateWindowExA
SendMessageA
GetParent
FindWindowA
RegisterWindowMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
GetClassNameA
DispatchMessageA
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
RegDeleteValueA
RegCloseKey
RegSetValueExA
SetTokenInformation
RegDeleteKeyA
GetUserNameA
DuplicateTokenEx
RegCreateKeyExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ