fuckyou
Static task
static1
Behavioral task
behavioral1
Sample
71c46a859f0729eb66d3fe7a9ae4c4e4.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
71c46a859f0729eb66d3fe7a9ae4c4e4.dll
Resource
win10v2004-20230220-en
General
-
Target
71c46a859f0729eb66d3fe7a9ae4c4e4
-
Size
116KB
-
MD5
71c46a859f0729eb66d3fe7a9ae4c4e4
-
SHA1
5094579ca8e60d04a3fd7ffad72f2cf6bb61c2a7
-
SHA256
999eafb11d2d8990f7a5b5b86f4052b8705a8fe0d21ea806d25bcffd54173e73
-
SHA512
b5429e454608326a2a9607706724a41f4a0d7e9c42e312095130cc45e76ea4f0d71c533c10fce5dcaad6a4f2908ccc74298e3a346e033d14b2899ec9963b08d3
-
SSDEEP
1536:STHyv5Zb8g9D720iWDrrZDvvyBnzD6nMVV4J1C2cffcWQVGsC/MY:dvj7biWDRvvKPyHyfcW2GsC/H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71c46a859f0729eb66d3fe7a9ae4c4e4
Files
-
71c46a859f0729eb66d3fe7a9ae4c4e4.dll windows x86
e3caadd564a0f376a947bee28dccac67
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
getsockname
gethostname
socket
gethostbyname
htons
connect
WSAIoctl
select
recv
WSACleanup
send
setsockopt
closesocket
WSAStartup
shell32
SHChangeNotify
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderPathA
advapi32
OpenSCManagerA
RegSetValueExA
DeleteService
OpenEventLogA
ClearEventLogA
CloseEventLog
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
SetServiceStatus
RegOpenKeyExA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
kernel32
GetFileType
GetStartupInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleW
VirtualFree
VirtualAlloc
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
Sleep
CloseHandle
ResetEvent
GlobalUnlock
GlobalLock
FindNextFileA
FindFirstFileA
GetCurrentProcess
GetVersion
WriteFile
DeviceIoControl
CreateFileA
SetLastError
LocalFree
GetLastError
GlobalAlloc
LocalAlloc
ReadFile
GetFileSize
GetSystemDirectoryA
DeleteFileA
FreeLibrary
LoadLibraryA
GetSystemInfo
lstrlenA
lstrcpyA
lstrcatA
lstrcmpiA
LoadLibraryW
GetTickCount
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetVersionExA
GetLocalTime
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
GetModuleFileNameA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DefineDosDeviceA
GetFileAttributesA
CreateFileW
GetCurrentThreadId
SetFilePointer
CreateProcessA
TerminateThread
ResumeThread
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
SetHandleCount
VirtualQuery
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetProcAddress
ExitProcess
RtlUnwind
RaiseException
GetModuleHandleW
DecodePointer
HeapReAlloc
ExitThread
CreateThread
GetCommandLineA
EncodePointer
IsProcessorFeaturePresent
user32
FindWindowA
GetClassNameA
GetWindow
GetKeyState
GetAsyncKeyState
MessageBoxA
GetWindowTextA
GetInputState
PostThreadMessageA
GetMessageA
GetLastInputInfo
wsprintfA
EmptyClipboard
SetClipboardData
ExitWindowsEx
OpenClipboard
GetClipboardData
CloseClipboard
SendMessageA
IsWindowVisible
EnumWindows
GetForegroundWindow
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
iphlpapi
GetIfTable
Exports
Exports
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ