Handlermapnet
Static task
static1
Behavioral task
behavioral1
Sample
c6ad49bda3203344faa4806f2395c86e5c0f5cee8806e118e7c317ec6237a58c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6ad49bda3203344faa4806f2395c86e5c0f5cee8806e118e7c317ec6237a58c.dll
Resource
win10v2004-20220901-en
General
-
Target
c6ad49bda3203344faa4806f2395c86e5c0f5cee8806e118e7c317ec6237a58c
-
Size
148KB
-
MD5
b94d5ccac7ef13d010d106919cdb90c3
-
SHA1
199ff2ff0afd9d9d206b3e1c1fb8f360b34f2a82
-
SHA256
c6ad49bda3203344faa4806f2395c86e5c0f5cee8806e118e7c317ec6237a58c
-
SHA512
e458747d7905d43719e3d14cfaeef23aee090b369caaab79f4b8884cd9176ccb835609f90bbd68663ba9fa22bfb7e6cb561a03096b70f3cb34dfabf493974389
-
SSDEEP
3072:rjbDo6G+efb5n9K8XgmoB5zcefNVXlx7RWnOTZ9d5/QAow:rboBfz5YLmoB5z7F1DRWnkZ9d5/QAd
Malware Config
Signatures
Files
-
c6ad49bda3203344faa4806f2395c86e5c0f5cee8806e118e7c317ec6237a58c.dll windows x86
9ba4b63cb3826aeedb2ccf22f4bb9e16
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
InterlockedCompareExchange
EnterCriticalSection
LocalFree
CloseHandle
OpenEventA
GetLastError
CreateFileA
ReadProcessMemory
SetLastError
GetProcessHeap
CreateDirectoryA
InterlockedIncrement
WaitForSingleObject
GlobalAlloc
GetTickCount
LeaveCriticalSection
CreateProcessA
TerminateProcess
ExitProcess
HeapFree
GetModuleHandleA
GetComputerNameA
OpenFileMappingA
GetModuleFileNameA
GetProcAddress
Sleep
LoadLibraryA
UnmapViewOfFile
WriteProcessMemory
GetVolumeInformationA
CreateEventA
GetCurrentProcess
CreateMutexW
GlobalFree
GetCommandLineA
CopyFileA
InterlockedDecrement
MapViewOfFile
HeapAlloc
CreateFileMappingA
ole32
OleCreate
CoCreateGuid
CoCreateInstance
CoUninitialize
OleSetContainedObject
CoSetProxyBlanket
CoTaskMemAlloc
CoInitialize
user32
RegisterWindowMessageA
GetSystemMetrics
GetMessageA
SendMessageA
DestroyWindow
ClientToScreen
TranslateMessage
CreateWindowExA
SetTimer
PostQuitMessage
PeekMessageA
DefWindowProcA
KillTimer
GetCursorPos
SetWindowLongA
GetWindowLongA
GetClassNameA
FindWindowA
GetWindow
GetWindowThreadProcessId
DispatchMessageA
ScreenToClient
SetWindowsHookExA
GetParent
UnhookWindowsHookEx
oleaut32
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
SetTokenInformation
RegCloseKey
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
RegDeleteKeyA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vhlfbu Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ