winEventPort
Static task
static1
Behavioral task
behavioral1
Sample
97879a5ba2700e7515c0e9bcf6502c8cd7a6b9024f45cf875f1a18e75d507cd9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97879a5ba2700e7515c0e9bcf6502c8cd7a6b9024f45cf875f1a18e75d507cd9.dll
Resource
win10v2004-20220812-en
General
-
Target
97879a5ba2700e7515c0e9bcf6502c8cd7a6b9024f45cf875f1a18e75d507cd9
-
Size
152KB
-
MD5
ce46a10f58e4b42496757183c302f38d
-
SHA1
06897f18861f140552006a744202f43f5202e849
-
SHA256
97879a5ba2700e7515c0e9bcf6502c8cd7a6b9024f45cf875f1a18e75d507cd9
-
SHA512
990fda700bc9fd172b8ba903858de2c15f59c4cf2ac7ba5671bf6f6671e0d351c7fa52b4fe8243295a97412fae97c43b5faa78790be661b4de7ab7da959d6dd8
-
SSDEEP
3072:86ftIDMcccHk8RhtU7nieNVeNNH5zvXO6zCowpPlEW0:PfyDM/chtU7n4NZqil0NE
Malware Config
Signatures
Files
-
97879a5ba2700e7515c0e9bcf6502c8cd7a6b9024f45cf875f1a18e75d507cd9.dll windows x86
1df7822b3dad2913c818d75b2dd5cd50
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
InterlockedIncrement
GetCommandLineA
CloseHandle
CreateMutexW
CreateFileMappingA
GetCurrentProcess
OpenFileMappingA
ExitProcess
Sleep
UnmapViewOfFile
CreateFileA
GetModuleHandleA
LoadLibraryA
LeaveCriticalSection
WriteProcessMemory
TerminateProcess
OpenEventA
LocalFree
GetModuleFileNameA
GetComputerNameA
GetTickCount
WaitForSingleObject
CreateDirectoryA
HeapAlloc
GlobalFree
CreateProcessA
InterlockedCompareExchange
WriteFile
ReadProcessMemory
GlobalAlloc
MapViewOfFile
GetProcessHeap
InterlockedDecrement
HeapFree
CopyFileA
GetVolumeInformationA
CreateEventA
SetLastError
GetProcAddress
GetLastError
ole32
CoInitialize
OleSetContainedObject
OleCreate
CoCreateInstance
CoUninitialize
CoCreateGuid
CoTaskMemAlloc
CoSetProxyBlanket
user32
ClientToScreen
KillTimer
SetWindowsHookExA
GetParent
DestroyWindow
SendMessageA
SetTimer
ScreenToClient
TranslateMessage
DispatchMessageA
GetSystemMetrics
CreateWindowExA
RegisterWindowMessageA
UnhookWindowsHookEx
PostQuitMessage
GetCursorPos
GetWindowThreadProcessId
GetWindow
FindWindowA
DefWindowProcA
GetWindowLongA
GetClassNameA
GetMessageA
SetWindowLongA
PeekMessageA
oleaut32
SysStringLen
SysAllocString
SysFreeString
SysAllocStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
DuplicateTokenEx
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SetTokenInformation
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
OpenProcessToken
RegQueryValueExA
GetUserNameA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ