DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6EA930620E66F8CB84E1774D0A6C0B2D.dll
Resource
win7-20230220-en
General
-
Target
ae4f3b8731c2b56a556827fe8ccbc52ca7d0535845c29be35fa3836783f76986.zip
-
Size
304KB
-
MD5
207953cb41486d5288346cd2b0013cac
-
SHA1
7d2bd46b917987f776f97566c73c061e016ec45c
-
SHA256
fc12599119cc3b0e2c642d93dc836c35f68d07183f215fcea52fe5c21f68e111
-
SHA512
0492e3cb2e4b86cc36d9373554a9e5c11e17a4ed0f9e0d0e46f86a7931cc488e24651e8853ad7017f3681fe4870aa85935500c35e686a0467bcd037e86cbd93d
-
SSDEEP
6144:mJhnIStsrzY3JJ0c+LLsAAYKKazG9PZ9RzPuGmawlg0wxB4zYhA:mJhnkY3JF+sDKZxPG/Nwz0F
Malware Config
Signatures
Files
-
ae4f3b8731c2b56a556827fe8ccbc52ca7d0535845c29be35fa3836783f76986.zip.zip
Password: infected
-
ae4f3b8731c2b56a556827fe8ccbc52ca7d0535845c29be35fa3836783f76986.zip.zip
Password: infected
-
6EA930620E66F8CB84E1774D0A6C0B2D.bin.dll regsvr32 windows x64
Password: infected
80163f179ff620bbd4aaf75202fd37e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OutputDebugStringW
OutputDebugStringA
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetStdHandle
CloseHandle
HeapSize
GetStringTypeW
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
WaitForSingleObjectEx
CreateThread
WriteConsoleW
CreateFileW
ExitProcess
HeapReAlloc
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlPcToFileHeader
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
HeapFree
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
RtlUnwind
user32
GetGestureInfo
InvalidateRect
ScreenToClient
CloseGestureInfoHandle
EndPaint
BeginPaint
GetMessageW
DefWindowProcW
DestroyWindow
CreateWindowExW
RegisterClassExW
LoadStringW
ShowWindow
DispatchMessageW
SetGestureConfig
TranslateAcceleratorW
TranslateMessage
LoadCursorW
PostQuitMessage
UpdateWindow
gdi32
Polyline
LineTo
CreatePen
MoveToEx
DeleteObject
SelectObject
ntdll
ZwOpenSymbolicLinkObject
LdrFindResource_U
NtAllocateVirtualMemory
NtTestAlert
LdrAccessResource
NtQueueApcThread
Exports
Exports
Sections
.text Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ