QgptkagOckl
Static task
static1
Behavioral task
behavioral1
Sample
20cb8f50376de5c1fb008e9fbeac0878.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20cb8f50376de5c1fb008e9fbeac0878.dll
Resource
win10v2004-20231215-en
General
-
Target
20cb8f50376de5c1fb008e9fbeac0878
-
Size
86KB
-
MD5
20cb8f50376de5c1fb008e9fbeac0878
-
SHA1
aff807b5130dada6e5140f96fafaef8084499bae
-
SHA256
77eee8d26a044095f172e1b3f9c03a2e2a17dfe0f83fbb4adbc11ff853952c94
-
SHA512
3a1d773f840314f56a30396414efd0418ca911cde90b00c2636ff7c928812567452a8fc9b4a6ee9cadd93bcbba8aef1b1cac972dab2d14b0b6d29bbbc38de8c8
-
SSDEEP
1536:FLb/NGRhj3un8C/DcL/429csW8U00lGcLn9cmOekf67sUMKqqra37rS30Qw:5VG+OL/lzGn9hO167sUaoa37rS30Qw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20cb8f50376de5c1fb008e9fbeac0878
Files
-
20cb8f50376de5c1fb008e9fbeac0878.dll windows:4 windows x86 arch:x86
2a6986a0fd71b9ed2ec126479c5df88d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
ReadFile
MoveFileA
SetLastError
TerminateThread
CreateProcessA
MapViewOfFile
CreateFileMappingA
GetLocalTime
UnmapViewOfFile
GlobalFree
FindClose
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
TerminateProcess
WaitForMultipleObjects
LocalSize
OpenProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetFileAttributesA
CreateDirectoryA
GetLastError
CreateFileA
SetFilePointer
WriteFile
FreeConsole
GetModuleHandleA
GetCurrentProcess
GetModuleFileNameA
GetVersionExA
lstrlenA
CreateThread
SetUnhandledExceptionFilter
CreateMutexA
SetErrorMode
OpenEventA
ReleaseMutex
GetProcessHeap
HeapAlloc
HeapFree
lstrcatA
Sleep
WinExec
CopyFileA
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
CancelIo
InterlockedExchange
InitializeCriticalSection
SetEvent
OutputDebugStringA
GetTickCount
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GlobalUnlock
user32
SetThreadDesktop
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CharNextA
MessageBoxA
GetWindowTextA
GetActiveWindow
UnhookWindowsHookEx
OpenInputDesktop
GetUserObjectInformationA
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
GetCursorPos
GetCursorInfo
ExitWindowsEx
IsWindowVisible
EnumWindows
CloseDesktop
OpenDesktopA
GetThreadDesktop
PostMessageA
SendMessageA
wsprintfA
LoadCursorA
CreateWindowExA
CloseWindow
IsWindow
DestroyCursor
ReleaseDC
gdi32
SelectObject
GetDIBits
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
CreateDIBSection
BitBlt
DeleteDC
advapi32
RegQueryValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
shell32
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathA
DoEnvironmentSubstA
ws2_32
inet_addr
gethostbyname
htons
socket
select
getsockname
gethostname
ntohs
closesocket
setsockopt
WSAIoctl
WSACleanup
WSAStartup
recv
send
connect
msvcrt
_strrev
??2@YAPAXI@Z
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
rename
strrchr
strcat
_except_handler3
free
strncpy
wcstombs
strtok
strchr
sprintf
strcpy
_access
fopen
fread
fclose
atoi
malloc
realloc
strcmp
_CxxThrowException
memcmp
_strnicmp
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrame
iphlpapi
AddIPAddress
GetInterfaceInfo
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shlwapi
PathFileExistsA
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ