Static task
static1
Behavioral task
behavioral1
Sample
4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df.dll
Resource
win10v2004-20230220-en
General
-
Target
4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df
-
Size
164KB
-
MD5
f0e56b0d6452d9a666a6a629051cb1ec
-
SHA1
a56499e2c5595ffa4a45c54e9b1a0c0aa650d56a
-
SHA256
4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df
-
SHA512
120b9a90d945c72a9f5535b40915fbe6d8cfdcf7ca11dcdd917e869c397c3653efaab19f60573607db77ad2ad543611345e898e91e74a12edbf187227176da46
-
SSDEEP
3072:clEseJuK2gXahGXa+1p+puo2kOPjtqbYtAYJP:CcTXahsPjtqY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df
Files
-
4ee5bf273488c7a89d77faa583043cfe84ada837c6e48606ab9e66261194c5df.dll windows x86
71874d157b7e276e2c88d322a253db69
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
ExitProcess
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileTime
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
DuplicateHandle
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
GetModuleFileNameA
GlobalLock
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
lstrcmpA
lstrcpynA
GetLastError
SetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GlobalUnlock
GlobalReAlloc
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
CloseHandle
InterlockedIncrement
GetEnvironmentStringsW
InterlockedDecrement
user32
GetSysColorBrush
DestroyMenu
UnregisterClassA
CharUpperA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
ShowWindow
SetWindowTextA
LoadIconA
MapWindowPoints
SetFocus
AdjustWindowRectEx
CopyRect
PtInRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
LoadCursorA
LoadBitmapA
GetSysColor
GetClientRect
EnableWindow
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
GetClassNameA
LoadStringA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
GetWindowLongA
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetDlgItem
gdi32
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
CreateSolidBrush
Rectangle
GetObjectA
BitBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ole32
CoCreateInstance
OleRun
oleaut32
SafeArrayCreate
SafeArrayCreateVector
SafeArrayDestroy
VariantClear
SafeArrayPutElement
SysFreeString
VariantChangeType
VariantCopy
VariantInit
SysAllocString
SysStringLen
SysAllocStringByteLen
GetErrorInfo
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE