dbapiClock
Static task
static1
Behavioral task
behavioral1
Sample
98c922e1c411960db91674b28cd610c942f95321cd6efbe1bcef98397ae72e34.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98c922e1c411960db91674b28cd610c942f95321cd6efbe1bcef98397ae72e34.dll
Resource
win10v2004-20220812-en
General
-
Target
98c922e1c411960db91674b28cd610c942f95321cd6efbe1bcef98397ae72e34
-
Size
144KB
-
MD5
c64f474c0d5f9ec4f3233a92d0c64f73
-
SHA1
6e0004ce7537b9066357b9dc279c1d5785073e91
-
SHA256
98c922e1c411960db91674b28cd610c942f95321cd6efbe1bcef98397ae72e34
-
SHA512
a2eb2846a81a0d6b4f67f881ebeca7396ce1a511048529e4bd564301003c6ce1a9727e908d46c65447b3db505409604d473910a60cbfe48fabff54c5c1774ddb
-
SSDEEP
3072:EVkVsDLBK9GvLiPyp5IYFCmpWcpp+1pZmlXk1Fq5E4O5qp5O5uc:+DLBKYj+ygCVPqpAXLk5qp88c
Malware Config
Signatures
Files
-
98c922e1c411960db91674b28cd610c942f95321cd6efbe1bcef98397ae72e34.dll windows x86
5fe854a042dc8eaf5d223fe427aab890
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
UnmapViewOfFile
GetModuleFileNameA
InterlockedDecrement
CreateDirectoryA
HeapFree
LeaveCriticalSection
GlobalAlloc
WriteProcessMemory
MapViewOfFile
ExitProcess
CreateFileA
CreateEventA
CopyFileA
CreateFileMappingA
InterlockedIncrement
ReadProcessMemory
GetCommandLineA
CloseHandle
WriteFile
GlobalFree
GetCurrentProcess
Sleep
WaitForSingleObject
LocalFree
GetComputerNameA
GetLastError
GetProcAddress
LoadLibraryA
HeapAlloc
GetProcessHeap
TerminateProcess
CreateProcessA
SetLastError
GetTickCount
OpenFileMappingA
CreateMutexW
EnterCriticalSection
GetVolumeInformationA
OpenEventA
InterlockedCompareExchange
ole32
CoUninitialize
CoCreateGuid
CoInitialize
CoSetProxyBlanket
OleSetContainedObject
CoTaskMemAlloc
OleCreate
CoCreateInstance
user32
SendMessageA
DefWindowProcA
SetTimer
FindWindowA
CreateWindowExA
ScreenToClient
GetSystemMetrics
GetMessageA
PostQuitMessage
RegisterWindowMessageA
SetWindowLongA
KillTimer
ClientToScreen
GetWindow
TranslateMessage
GetCursorPos
UnhookWindowsHookEx
DispatchMessageA
GetWindowLongA
PeekMessageA
GetWindowThreadProcessId
GetClassNameA
DestroyWindow
SetWindowsHookExA
GetParent
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
SysStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
GetUserNameA
RegSetValueExA
RegQueryValueExA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
SetTokenInformation
RegDeleteKeyA
DuplicateTokenEx
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ