Fuck
Static task
static1
Behavioral task
behavioral1
Sample
3b0000.dll
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
3b0000.dll
Resource
win10v2004-20230221-en
General
-
Target
3b0000.dll
-
Size
130KB
-
MD5
68eeacea6d7fe8740dcfbae59f5e88b7
-
SHA1
6fa149ef3ca953e5604dcf47c7a626c720f2bb14
-
SHA256
671f53493962d777ded0a3b10fcaac695a9dbfe9b8deed51a5bebd696356a979
-
SHA512
749c0e6d4152918a4b19b0b6a24a1428a515e209de714a0ce3315a5dd47b4200f2c8826fed0233ea902527a4a0a4a7fed4b490673376dea69261174c99de1201
-
SSDEEP
1536:/BU89fIu9SVFRBp8MjBMOOE09wcpzLoOkkYnbMe1233qOIImjHTvlXtjOGqDi5+T:/BU+fIuAiblZLoOLeE36OzmjHRXRVy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b0000.dll
Files
-
3b0000.dll.dll windows x86
658d3b28a0ea31f2909c4f4a74b2b9f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
ResetEvent
CreateThread
CancelIo
InterlockedExchange
SetEvent
EnterCriticalSection
LeaveCriticalSection
Sleep
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
GetModuleFileNameA
GetFileSize
ExpandEnvironmentStringsA
lstrcatA
lstrcpyA
CreateProcessA
GetTempPathA
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
VirtualProtect
HeapAlloc
GetProcessHeap
HeapFree
GetComputerNameA
CloseHandle
InterlockedDecrement
GetFileAttributesA
GetModuleFileNameW
CreateMutexA
GetLastError
GetCurrentThreadId
TerminateProcess
GetStdHandle
SetHandleCount
SetFilePointer
RtlUnwind
LocalFree
SetEnvironmentVariableA
CompareStringW
CreateFileW
SetEndOfFile
GetStringTypeW
WaitForSingleObject
CreateEventA
InitializeCriticalSection
VirtualAlloc
lstrlenA
VirtualFree
LCMapStringW
WriteConsoleW
LoadLibraryW
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
InitializeCriticalSectionAndSpinCount
SetLastError
GetModuleHandleW
GetCPInfo
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
WideCharToMultiByte
HeapDestroy
HeapCreate
ExitProcess
HeapSize
ReadFile
MultiByteToWideChar
GetStartupInfoW
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineA
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetFileType
user32
GetLastInputInfo
GetClipboardData
SetClipboardData
EmptyClipboard
OpenClipboard
ExitWindowsEx
wsprintfA
CloseClipboard
advapi32
CloseEventLog
ClearEventLogA
OpenEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
ws2_32
WSACleanup
socket
gethostbyname
htons
inet_ntoa
connect
getsockname
setsockopt
WSAIoctl
select
recv
closesocket
send
gethostname
inet_addr
WSAStartup
Exports
Exports
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ