Handlermapnet
Static task
static1
Behavioral task
behavioral1
Sample
cee0512dee7b8adcae0aaaf361c35e793f830296e0a44948b3d69b00706529a8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cee0512dee7b8adcae0aaaf361c35e793f830296e0a44948b3d69b00706529a8.dll
Resource
win10v2004-20220901-en
General
-
Target
cee0512dee7b8adcae0aaaf361c35e793f830296e0a44948b3d69b00706529a8
-
Size
148KB
-
MD5
b25764f408c2097295aeb7f1051b82b3
-
SHA1
f9ae7f6f7e43f25570b93d0c39c2470d11f9f893
-
SHA256
cee0512dee7b8adcae0aaaf361c35e793f830296e0a44948b3d69b00706529a8
-
SHA512
7c296f11cbd77a29e4d1ab4e69f58193cf77f7b8f9e2721fbfdfef6c6c06fc267725975c4625a8699a4f71d72b2fd64df919b7c40c89b4a1e99e7f168be9e9e3
-
SSDEEP
3072:rjbDo6G+efb5n9K8XgmoB5zcefNVXlx7zcwB8WiowGZ9d5/QAow:rboBfz5YLmoB5z7F1Dzh8WidGZ9d5/Qs
Malware Config
Signatures
Files
-
cee0512dee7b8adcae0aaaf361c35e793f830296e0a44948b3d69b00706529a8.dll windows x86
9ba4b63cb3826aeedb2ccf22f4bb9e16
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
InterlockedCompareExchange
EnterCriticalSection
LocalFree
CloseHandle
OpenEventA
GetLastError
CreateFileA
ReadProcessMemory
SetLastError
GetProcessHeap
CreateDirectoryA
InterlockedIncrement
WaitForSingleObject
GlobalAlloc
GetTickCount
LeaveCriticalSection
CreateProcessA
TerminateProcess
ExitProcess
HeapFree
GetModuleHandleA
GetComputerNameA
OpenFileMappingA
GetModuleFileNameA
GetProcAddress
Sleep
LoadLibraryA
UnmapViewOfFile
WriteProcessMemory
GetVolumeInformationA
CreateEventA
GetCurrentProcess
CreateMutexW
GlobalFree
GetCommandLineA
CopyFileA
InterlockedDecrement
MapViewOfFile
HeapAlloc
CreateFileMappingA
ole32
OleCreate
CoCreateGuid
CoCreateInstance
CoUninitialize
OleSetContainedObject
CoSetProxyBlanket
CoTaskMemAlloc
CoInitialize
user32
RegisterWindowMessageA
GetSystemMetrics
GetMessageA
SendMessageA
DestroyWindow
ClientToScreen
TranslateMessage
CreateWindowExA
SetTimer
PostQuitMessage
PeekMessageA
DefWindowProcA
KillTimer
GetCursorPos
SetWindowLongA
GetWindowLongA
GetClassNameA
FindWindowA
GetWindow
GetWindowThreadProcessId
DispatchMessageA
ScreenToClient
SetWindowsHookExA
GetParent
UnhookWindowsHookEx
oleaut32
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
SetTokenInformation
RegCloseKey
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
RegDeleteKeyA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vhlfbu Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ