Static task
static1
Behavioral task
behavioral1
Sample
1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777.dll
Resource
win10v2004-20230220-en
General
-
Target
1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777
-
Size
176KB
-
MD5
3a4ea138f7c6502dd30b9ef758a88089
-
SHA1
e3ba22c9b3bb459bc0bf66735a563ec6e29c0928
-
SHA256
1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777
-
SHA512
e79d5903facab89fed76d110e9c75a15dac9f4419ab505d096d47dafa7555413898cc30762f469a98e29287685809cd3e783236e4ddf58cd365214a4c417291e
-
SSDEEP
3072:5/p6XWnAD90reLBYD0HyqYJ7P1Y7okHOTZFCyoIkySkRVLiG:Rp67yrCBBXq7P1fTZlTR5i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777
Files
-
1a6a67506aeda68e626bb84a51256a6ac7c75cd6e0d7d46b21c84b95bd6a4777.dll windows x86
7ac2d516b7e4b503c88019f7055ce3bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
GetHGlobalFromStream
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
SysFreeString
VariantClear
SysAllocString
kernel32
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
HeapFree
HeapAlloc
RtlUnwind
HeapReAlloc
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
HeapSize
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetFileAttributesA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedDecrement
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GlobalFree
LoadLibraryA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
LocalFree
lstrlenA
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
lstrlenW
GlobalUnlock
GlobalReAlloc
GlobalLock
GetLastError
GetVersionExA
LoadLibraryW
GetProcAddress
FreeLibrary
GetUserDefaultLangID
WideCharToMultiByte
MultiByteToWideChar
user32
SetWindowTextA
ShowWindow
CharUpperA
ReleaseDC
GetDC
ClientToScreen
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
UnregisterClassA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
MapWindowPoints
SetFocus
AdjustWindowRectEx
CopyRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
LoadIconA
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostMessageA
PostQuitMessage
GetClientRect
LoadBitmapA
GetWindowLongA
SetWindowLongA
GetSysColor
LoadCursorA
EnableWindow
GetParent
IsWindow
SendMessageA
GetSystemMetrics
gdi32
SaveDC
RestoreDC
SelectObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
BitBlt
Rectangle
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
CreateSolidBrush
CreatePen
CreateFontIndirectA
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
comctl32
ord17
ImageList_Destroy
ImageList_Read
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE