uniMouseARM
Static task
static1
Behavioral task
behavioral1
Sample
cd2593754515126e1e2e4115e019fccd.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cd2593754515126e1e2e4115e019fccd.dll
Resource
win10v2004-20240226-en
General
-
Target
cd2593754515126e1e2e4115e019fccd
-
Size
148KB
-
MD5
cd2593754515126e1e2e4115e019fccd
-
SHA1
cb1fee1230aecdb65fcc62a7ddade21baab8ee9b
-
SHA256
8cf22c25ab23cc69c36413cbc3df2fb94094e38c316bdcdfbe300002f370d89b
-
SHA512
ed50dcfe2296b56300d6d02d5e3348e7f282544382b6c756f2fce0b945881010025782e2f9f9784c30d03544b30ca86197724cc3a00b8d5510424c0b85151ad2
-
SSDEEP
3072:8p0pzi70br7NBIZzA9MHY8yk4ioFFXCz/fmiPJjcf8P9QOjQRaoaF:zxFOzmJdXioLXCbo8lQsoaF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd2593754515126e1e2e4115e019fccd
Files
-
cd2593754515126e1e2e4115e019fccd.dll windows:4 windows x86 arch:x86
58d62511c91b71a1990e2bafe6d4ed30
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetVolumeInformationA
GetModuleFileNameA
TerminateProcess
CreateFileMappingA
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
MapViewOfFile
WaitForSingleObject
UnmapViewOfFile
GlobalAlloc
SetLastError
InterlockedDecrement
WriteFile
LoadLibraryA
LocalFree
GetCurrentProcess
GetModuleHandleA
OpenFileMappingA
GetLastError
GlobalFree
CreateProcessA
GetTickCount
CreateDirectoryA
InterlockedCompareExchange
CreateFileA
GetProcAddress
ExitProcess
Sleep
CreateEventA
OpenEventA
GetCommandLineA
ReadProcessMemory
HeapAlloc
GetComputerNameA
CloseHandle
CopyFileA
WriteProcessMemory
GetProcessHeap
CreateMutexW
ole32
CoUninitialize
OleSetContainedObject
CoCreateInstance
OleCreate
CoSetProxyBlanket
CoInitialize
CoCreateGuid
CoTaskMemAlloc
user32
CreateWindowExA
DispatchMessageA
UnhookWindowsHookEx
GetClassNameA
GetMessageA
GetSystemMetrics
PeekMessageA
KillTimer
RegisterWindowMessageA
SetTimer
GetWindowLongA
GetWindow
SendMessageA
SetWindowsHookExA
FindWindowA
TranslateMessage
GetCursorPos
ScreenToClient
GetParent
DestroyWindow
ClientToScreen
SetWindowLongA
GetWindowThreadProcessId
DefWindowProcA
PostQuitMessage
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
SysStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegSetValueExA
DuplicateTokenEx
GetUserNameA
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
SetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ