Static task
static1
Behavioral task
behavioral1
Sample
a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973.dll
Resource
win10v2004-20230220-en
General
-
Target
a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973
-
Size
156KB
-
MD5
6fd107cf8b81b263f99986975c75fa77
-
SHA1
d652c19a692f793fa7cd9329129440527c34f2bc
-
SHA256
a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973
-
SHA512
77208cc2ad040811b997572479b4e9991d2bd994b80353753a537ddf56d52a0537200c20d91f4288a1921b9aa12ad85c18ea30137779d0aa1b36212eec8ca320
-
SSDEEP
3072:XgurOT+G1zkKdivaASb4AV4fMRMUEY3tXuDoWkV2X/pv2k3:Xgur5G1zVF1T4fE3tXlO2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973
Files
-
a9afcce3f4df072ee4400685458236848e042b19c18a40742afb009513032973.dll windows x86
75889273a2d161ac42ddb88c07d5d878
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapSize
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
TerminateProcess
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
ExitProcess
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
GlobalUnlock
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
GlobalFree
MultiByteToWideChar
lstrlenA
InterlockedIncrement
InterlockedDecrement
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
CloseHandle
GetModuleFileNameA
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GlobalReAlloc
WideCharToMultiByte
GlobalLock
GetEnvironmentStrings
user32
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
UnregisterClassA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
MapWindowPoints
SetFocus
AdjustWindowRectEx
CopyRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetWindowLongA
SetWindowLongA
RegisterClipboardFormatA
EnableWindow
GetClientRect
GetMenuItemCount
LoadIconA
LoadBitmapA
GetSysColor
LoadCursorA
GetForegroundWindow
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectObject
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
DeleteDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateFontIndirectA
BitBlt
Rectangle
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
CreateSolidBrush
CreatePen
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
DragQueryFileA
comctl32
ImageList_Destroy
ord17
ImageList_Read
ole32
CoCreateInstance
ReleaseStgMedium
RegisterDragDrop
RevokeDragDrop
OleInitialize
OleUninitialize
wldap32
ord29
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE