_CryptoCheckSignMessage@24
Static task
static1
Behavioral task
behavioral1
Sample
20f62c7cd0d406c283096af226dca7b84ef5cb1b9f940d7b2d2c7452c671f604_unpacked.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20f62c7cd0d406c283096af226dca7b84ef5cb1b9f940d7b2d2c7452c671f604_unpacked.dll
Resource
win10v2004-20220812-en
General
-
Target
20f62c7cd0d406c283096af226dca7b84ef5cb1b9f940d7b2d2c7452c671f604_unpacked
-
Size
107KB
-
MD5
81550515b4f0ccfa528d608986781dc6
-
SHA1
770d2e54f8072f6efdbccadc97345afc5fd53260
-
SHA256
5e3a4e5db42c66f294352db26ce6f39796dc9d1f56b6257563d49591e515531c
-
SHA512
1c06560a9952fb670564f2345d8229ffc7d1a2db74c3378676529a3c7e6c7fb2de3ed8112163903fed0115aaf2396dda024f7cefe7e488e305e64540f8f34933
-
SSDEEP
1536:E5kzLsQpGNFZpJnqoti/K/pU3jsgW6pY5pZon3s:E5FjJLKCejU61n3s
Malware Config
Signatures
Files
-
20f62c7cd0d406c283096af226dca7b84ef5cb1b9f940d7b2d2c7452c671f604_unpacked.dll windows x86
65d6e39470859aea8ee9fba7d62a4b3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OpenMutexA
OpenProcess
PeekNamedPipe
Process32First
Process32Next
ReadFile
ReleaseMutex
RemoveDirectoryA
ResetEvent
GetSystemInfo
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetNamedPipeHandleState
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TryEnterCriticalSection
UnlockFileEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WaitNamedPipeA
WideCharToMultiByte
WriteFile
WriteFileEx
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpyW
lstrlenA
lstrlenW
GlobalAlloc
GetProcAddress
GetOverlappedResult
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFileSize
GetEnvironmentVariableA
GetCurrentProcessId
GetCurrentProcess
FindNextFileA
GetComputerNameA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
EnterCriticalSection
DisconnectNamedPipe
DeleteFileA
DeleteCriticalSection
CreateToolhelp32Snapshot
CreateThread
CreateProcessA
CreateNamedPipeA
CreateMutexA
CreateFileW
CreateFileMappingA
CreateFileA
CreateDirectoryA
ConnectNamedPipe
SetEndOfFile
CloseHandle
GlobalFree
ws2_32
listen
ioctlsocket
htons
gethostbyname
closesocket
bind
accept
select
socket
__WSAFDIsSet
user32
ExitWindowsEx
GetIconInfo
DrawIcon
GetWindowRect
GetWindowDC
LoadCursorA
GetDesktopWindow
wsprintfA
ReleaseDC
DrawTextA
advapi32
QueryServiceStatusEx
LookupPrivilegeValueA
GetUserNameA
EnumDependentServicesA
DeleteService
ControlService
CloseServiceHandle
ChangeServiceConfigA
AdjustTokenPrivileges
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
shell32
ShellExecuteA
ShellExecuteExA
gdi32
CreateCompatibleDC
DeleteDC
DeleteObject
GdiFlush
SelectObject
SetBkColor
SetStretchBltMode
SetTextColor
StretchBlt
CreateDIBSection
ole32
CreateStreamOnHGlobal
Exports
Exports
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ