Static task
static1
Behavioral task
behavioral1
Sample
41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e.dll
Resource
win10v2004-20230220-en
General
-
Target
41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e
-
Size
944KB
-
MD5
436aace88e03b7e79aaad507f838ee18
-
SHA1
e410ff429b17658154c71e17bf98de6fd5d9523b
-
SHA256
41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e
-
SHA512
3cde508a4cc1c6bc4a50f0ea1f52fbdd78cc710d5915c8a5ab2af7d1c13c6d3da83fa5eb564c68753fbbe427528d3c23f415e3836aa76d2761772c446425ffcc
-
SSDEEP
12288:JIKIlk6bXeWBB1AKzE6se9e+rBSSRFhqUJZKIJUVfBaODthn62mEL8D:JIKIsWNAyxvnNRDHLKIS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e
Files
-
41d2b8a15de166504441433207501665b01a2fdead0dc963d5fef1c792bac46e.dll windows x86
f5a9a2dd5a6ca29f3e7f62a618dcd547
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
getpeername
shutdown
closesocket
setsockopt
send
recv
getservbyname
ntohs
socket
WSAGetLastError
inet_addr
htons
connect
kernel32
SetEndOfFile
GetLocaleInfoW
SetStdHandle
LCMapStringW
LCMapStringA
CompareStringW
CompareStringA
LoadLibraryA
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
GetStringTypeW
GetStringTypeA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
SetNamedPipeHandleState
GetCurrentDirectoryA
CreateFileA
GetLastError
UnmapViewOfFile
WaitForSingleObject
SetEvent
MapViewOfFile
OpenFileMappingA
OpenEventA
GetWindowsDirectoryA
ReadFile
WriteFile
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
InterlockedIncrement
CreateSemaphoreA
InterlockedDecrement
GetFullPathNameA
GetDriveTypeA
WaitNamedPipeA
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetTimeZoneInformation
MultiByteToWideChar
Sleep
GetFileAttributesA
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
GetProcAddress
RaiseException
GetCurrentThreadId
SetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 736KB - Virtual size: 775KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE