DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
UpdateConfig.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UpdateConfig.dll
Resource
win10v2004-20230220-en
Target
UpdateConfig.json
Size
1.8MB
MD5
795dc022c8897e290b26f620b0124e5e
SHA1
6852777dbd21562869e57937dc61185ac6bc13ba
SHA256
5191fe222010ba7eb589e2ff8771c3a75ea7c7ffc00f0ba3f7d716f12010dd96
SHA512
d022243802e495bfeca016f9f3abcedf5192d90f9180a8472f8bee6263e3d5a4f9dba6329f1ffc29955cedecf9833248ea52cb69cb3e9727878bb6e4725b9901
SSDEEP
24576:t2z628Ewa0MIoe7yWL9XzUX3hXFA77mBRcTvM9qNi/qGbzaeILGXtx1K1vN9f:g6hEwiZ+yBXFAWrcSqGsGdxk1vN
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
AddSecureMemoryCacheCallback
CancelIo
ChangeTimerQueueTimer
ClearCommBreak
CloseHandle
ConnectNamedPipe
CreateActCtxA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
CreateMutexW
CreateNamedPipeA
CreatePipe
CreateProcessW
CreateRemoteThread
CreateThread
CreateTimerQueue
CreateTimerQueueTimer
CreateToolhelp32Snapshot
DebugBreakProcess
DecodePointer
DeleteCriticalSection
DeleteTimerQueueEx
DeleteTimerQueueTimer
DisconnectNamedPipe
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FatalAppExitA
FileTimeToSystemTime
FindActCtxSectionGuid
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlsGetValue
FlsSetValue
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommConfig
GetCommandLineA
GetCommandLineW
GetComputerNameExW
GetConsoleMode
GetConsoleOriginalTitleA
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDllDirectoryW
GetEnvironmentStringsW
GetErrorMode
GetFileAttributesW
GetFileMUIPath
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNLSVersion
GetNumaHighestNodeNumber
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProcessId
GetProcessPreferredUILanguages
GetProcessWorkingSetSizeEx
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadContext
GetThreadIOPendingFlag
GetThreadId
GetThreadPriority
GetThreadTimes
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetVolumeInformationByHandleW
GetWriteWatch
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
IsBadStringPtrA
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLanguageGroup
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
NeedCurrentDirectoryForExePathA
OpenJobObjectW
OpenProcess
OpenThread
PostQueuedCompletionStatus
Process32FirstW
Process32NextW
ProcessIdToSessionId
QueryDepthSList
QueryMemoryResourceNotification
QueryPerformanceCounter
QueueUserWorkItem
RaiseException
ReadFile
ReadProcessMemory
RegisterWaitForSingleObject
ReleaseMutex
ReleaseSemaphore
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
SetCalendarInfoW
SetConsoleDisplayMode
SetCurrentDirectoryW
SetEvent
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
SetHandleInformation
SetLastError
SetLocalTime
SetLocaleInfoA
SetLocaleInfoW
SetStdHandle
SetThreadAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SetupComm
SignalObjectAndWait
Sleep
SleepEx
SuspendThread
SwitchToThread
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnregisterWait
UnregisterWaitEx
VerLanguageNameA
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteConsoleW
WriteFile
WriteProcessMemory
AnimateWindow
BroadcastSystemMessageExA
CallMsgFilterW
CallWindowProcA
CharNextW
CharToOemA
CreateAcceleratorTableW
DefFrameProcA
DefMDIChildProcW
DefRawInputProc
DestroyCaret
DrawIcon
DrawMenuBar
EnumDesktopsA
FindWindowA
FindWindowExA
GetCaretBlinkTime
GetClassNameW
GetClipboardData
GetClipboardFormatNameA
GetClipboardViewer
GetDlgCtrlID
GetFocus
GetIconInfoExA
GetMenuItemCount
GetMessagePos
GetMonitorInfoW
GetProcessDefaultLayout
GetSystemMetrics
GetThreadDesktop
GetWindowModuleFileNameA
GetWindowThreadProcessId
InsertMenuA
IsCharAlphaNumericW
IsProcessDPIAware
IsRectEmpty
IsWindowVisible
LoadMenuIndirectW
LoadStringW
LockSetForegroundWindow
LockWindowUpdate
MenuItemFromPoint
MessageBeep
PostQuitMessage
RealChildWindowFromPoint
RealGetWindowClassW
RegisterHotKey
RegisterWindowMessageW
RemoveMenu
SendMessageCallbackW
SetCaretBlinkTime
SetCaretPos
SetClassWord
SetDlgItemTextW
SetMenuDefaultItem
SetPropW
SetThreadDesktop
SetWindowLongA
ShowCursor
SubtractRect
SwitchToThisWindow
SystemParametersInfoW
TranslateMessage
UnregisterClassW
UserHandleGrantAccess
ValidateRect
keybd_event
Chord
CopyMetaFileW
CreateColorSpaceW
CreateScalableFontResourceW
EnumFontFamiliesExA
FlattenPath
GetBkMode
GetCharWidth32W
GetCurrentObject
GetDIBColorTable
GetDeviceCaps
GetICMProfileW
GetOutlineTextMetricsA
GetRandomRgn
GetStockObject
GetTextCharsetInfo
GetTextMetricsW
GetWorldTransform
PlayEnhMetaFileRecord
PolyBezier
PolyPolyline
ResetDCA
SaveDC
SelectClipRgn
SetBitmapBits
SetColorSpace
SetMetaFileBitsEx
SetPixelFormat
StrokePath
TextOutA
CommandLineToArgvW
FindExecutableW
SHFileOperationW
SHGetDiskFreeSpaceExW
SHGetFileInfoA
SHInvokePrinterCommandA
SHQueryUserNotificationState
SHSetUnreadMailCountW
PathFindFileNameA
StrRChrIA
StrStrIW
UuidCreate
GetAdaptersAddresses
GetBestInterfaceEx
WSAGetLastError
WSAStartup
closesocket
connect
freeaddrinfo
getaddrinfo
recv
send
shutdown
socket
AdjustTokenPrivileges
CreateProcessAsUserW
CreateProcessWithLogonW
CreateProcessWithTokenW
DuplicateTokenEx
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
GetUserNameW
ImpersonateLoggedOnUser
InitializeSecurityDescriptor
LogonUserW
LookupAccountSidW
LookupPrivilegeValueW
OpenProcessToken
PrivilegeCheck
RevertToSelf
SetSecurityDescriptorDacl
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetProcessImageFileNameW
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpOpenRequest
WinHttpQueryHeaders
WinHttpReadData
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetOption
GetUserNameExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ