GetInterface
Static task
static1
Behavioral task
behavioral1
Sample
9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440.dll
Resource
win10v2004-20230220-en
General
-
Target
9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440
-
Size
516KB
-
MD5
c22d4f57b31fc244cd7ae14566e929fb
-
SHA1
e923c73a889b91653f596bebdc0a0597feef50fe
-
SHA256
9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440
-
SHA512
3505e132cbb07fa9e191e7a7892583ee5951a2ebff5ec58831a7899a1fb30ed9417e272944ddca86ce6849db741e0f5a30402873ba9c66402b585d9930005694
-
SSDEEP
12288:IptlXa7vEqkwIyRPAuuvLn7Z7gSmgRpNNqjPkfu:IMvXC7l9Rparkf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440
Files
-
9e44e4190ad5e2fef05f5eb6f84bfbf98be5a348e8eb9ceef63f5480388b8440.dll windows x86
1fbb3d0b8323f503fa27644fc3c6585e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
InterlockedExchange
GetCurrentDirectoryA
GetFullPathNameA
ExitThread
GetDriveTypeA
FileTimeToLocalFileTime
FormatMessageW
GetExitCodeThread
DuplicateHandle
SleepEx
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
IsValidLocale
GetUserDefaultLCID
InterlockedCompareExchange
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
GetModuleHandleA
HeapCreate
GetCommandLineA
InterlockedDecrement
InterlockedIncrement
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
VirtualAlloc
VirtualFree
LoadLibraryA
GetThreadLocale
GetLocaleInfoA
GetACP
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
FileTimeToSystemTime
GetProcessHeap
SetFileAttributesA
WriteFile
CreateFileA
HeapAlloc
HeapFree
LocalAlloc
CreateThread
TerminateThread
QueryDosDeviceW
ExpandEnvironmentStringsW
TerminateProcess
GetLogicalDriveStringsW
GetWindowsDirectoryA
OpenMutexW
CreateEventW
WaitForSingleObject
SetEvent
GetTickCount
OpenEventW
MoveFileExW
MoveFileExA
MoveFileW
DeleteFileW
DeleteFileA
FindClose
FindFirstFileA
GetFileSizeEx
SetFilePointer
GetFileAttributesW
GetFirmwareEnvironmentVariableW
GetSystemDirectoryW
Sleep
GetLocalTime
CreateDirectoryW
WaitForMultipleObjects
GetExitCodeProcess
GetPrivateProfileStringW
CopyFileW
CreateProcessW
GetPrivateProfileIntW
GlobalAlloc
GlobalFree
ReleaseMutex
CreateMutexW
DeleteCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetModuleFileNameW
GetFileSize
ReadFile
GetCurrentThreadId
FreeLibrary
LoadLibraryW
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileW
OpenProcess
GetModuleHandleW
GetProcAddress
SetLastError
LocalFree
GetLastError
GetCurrentProcess
CloseHandle
EnumSystemLocalesA
user32
UnregisterClassA
advapi32
AllocateAndInitializeSid
EqualSid
FreeSid
CreateWellKnownSid
CheckTokenMembership
RegQueryInfoKeyW
RegEnumKeyW
RegCreateKeyW
OpenSCManagerW
RegEnumKeyExW
GetUserNameW
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyW
RegDeleteKeyW
DuplicateTokenEx
RegSetValueExW
RegCreateKeyExW
StartServiceW
QueryServiceStatus
CreateServiceW
OpenServiceW
ChangeServiceConfigW
CloseServiceHandle
SetEntriesInAclW
GetTokenInformation
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
BuildExplicitAccessWithNameW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetTokenInformation
shell32
SHGetFolderPathW
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderPathW
ord680
ole32
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
StrStrIA
PathAddBackslashW
PathRemoveFileSpecW
PathFindExtensionW
PathFileExistsW
PathAppendW
PathFindFileNameW
PathMatchSpecW
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
userenv
ExpandEnvironmentStringsForUserW
ws2_32
gethostbyname
socket
connect
WSASetLastError
__WSAFDIsSet
select
ioctlsocket
WSACleanup
WSAStartup
closesocket
WSAGetLastError
recv
send
getsockname
ntohs
bind
htons
getsockopt
setsockopt
urlmon
URLDownloadToFileW
wininet
DeleteUrlCacheEntryW
Exports
Exports
Sections
.text Size: 376KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ