ClipMobilemm
Static task
static1
Behavioral task
behavioral1
Sample
d18977cdf28243d33aa6365e94ba912211b0bd45236599849b43568801253b99.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d18977cdf28243d33aa6365e94ba912211b0bd45236599849b43568801253b99.dll
Resource
win10v2004-20221111-en
General
-
Target
d18977cdf28243d33aa6365e94ba912211b0bd45236599849b43568801253b99
-
Size
148KB
-
MD5
1130d714a18dcfb900123cf5fb08a586
-
SHA1
c729072290ec85ba9703cab6f68318f493691d20
-
SHA256
d18977cdf28243d33aa6365e94ba912211b0bd45236599849b43568801253b99
-
SHA512
9e7e053f7820d80cad9fc13db4ae85731547572527e05062acfe58a928bbf40c1b05fafb393dfb8490a286e8ec9e70c5e7d1f94be3276c8148c3d179784f697f
-
SSDEEP
3072:gWD0mMrLxTResRFFazCPBqhJQKeROPL1RMiIib34C:g00nxTosRcC9KeROP5qz44C
Malware Config
Signatures
Files
-
d18977cdf28243d33aa6365e94ba912211b0bd45236599849b43568801253b99.dll windows x86
9ca20bbbea99a64b2bb960458bc00cf6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ExitProcess
GetCommandLineA
HeapAlloc
UnmapViewOfFile
SetLastError
MapViewOfFile
CreateDirectoryA
CreateMutexW
CreateProcessA
GetProcAddress
WriteFile
InterlockedDecrement
CreateFileA
CreateFileMappingA
OpenFileMappingA
GetProcessHeap
LocalFree
TerminateProcess
WriteProcessMemory
OpenEventA
HeapFree
GetModuleFileNameA
GetCurrentProcess
EnterCriticalSection
GetVolumeInformationA
GetModuleHandleA
WaitForSingleObject
GlobalFree
InterlockedCompareExchange
CreateEventA
GlobalAlloc
GetTickCount
CloseHandle
GetComputerNameA
ReadProcessMemory
LeaveCriticalSection
LoadLibraryA
InterlockedIncrement
CopyFileA
GetLastError
ole32
CoInitialize
OleSetContainedObject
CoCreateGuid
CoCreateInstance
CoTaskMemAlloc
CoSetProxyBlanket
CoUninitialize
OleCreate
user32
SetTimer
PeekMessageA
GetCursorPos
ScreenToClient
TranslateMessage
SetWindowsHookExA
ClientToScreen
GetClassNameA
DispatchMessageA
SetWindowLongA
GetWindow
PostQuitMessage
GetSystemMetrics
GetParent
GetWindowLongA
KillTimer
SendMessageA
FindWindowA
GetMessageA
DefWindowProcA
GetWindowThreadProcessId
UnhookWindowsHookEx
DestroyWindow
CreateWindowExA
RegisterWindowMessageA
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
OpenProcessToken
SetTokenInformation
DuplicateTokenEx
GetUserNameA
RegCloseKey
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 985B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ