CopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00.dll
Resource
win10v2004-20230221-en
General
-
Target
a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00
-
Size
48KB
-
MD5
deaca9b3c506d6c413f9e498c0e63536
-
SHA1
db49c4372ea0c317d5badc6226abf2e550ac8ae4
-
SHA256
a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00
-
SHA512
e986fc442c6ddc47856188bd29d92b266ad91a051eb40b4aa991c23164755415ce9689e5a2a85221c8c12d98557d5899f86738a20a0eb5a4267aeb1dc8ed2e51
-
SSDEEP
768:3W51im2DKjNaCgOhzKKNp4yF/ySqj2j5XrZIylOhIdO7Vw4PW6UefV:3W51iTuhaJOhFNpySqYbTlOKcO8UM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00
Files
-
a216521a9d863c1f93b7512fe270dd23d3608f3e979a6bfd268614eee04f3d00.dll windows x86
3c36b04bc5cd80f9932837c01b39d1d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetWaitableTimer
GetCurrentProcessId
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
ReadFile
GetFileSize
CreateFileA
CreateWaitableTimerA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
DeleteCriticalSection
CreateThread
GetTickCount
GlobalFree
GlobalUnlock
lstrlenW
GetModuleHandleA
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCommandLineA
GetCurrentProcess
TerminateThread
user32
MoveWindow
SetCursor
SetWindowPos
ShowWindowAsync
DefWindowProcA
GetAsyncKeyState
RegisterClassA
GetWindowRect
CreateWindowExA
ShowWindow
UpdateWindow
SetParent
InvalidateRect
SetPropA
SetWindowLongW
LoadCursorW
MsgWaitForMultipleObjects
GetDC
GetLastInputInfo
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
IsWindowVisible
GetWindowThreadProcessId
FindWindowExA
GetDesktopWindow
RemovePropA
ReleaseDC
gdiplus
GdipGetImageWidth
GdipDrawImageRect
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipSetPixelOffsetMode
GdipSetInterpolationMode
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipGetImageGraphicsContext
GdipLoadImageFromStream
GdipDrawString
GdipDrawImageRectRect
GdipCreateSolidFill
GdipCreateStringFormat
GdiplusStartup
GdipGetImageHeight
ole32
CreateStreamOnHGlobal
msvcrt
_ftol
memmove
__CxxFrameHandler
strncmp
??3@YAXPAX@Z
malloc
free
strchr
strrchr
floor
modf
atoi
shlwapi
PathFileExistsA
gdi32
DeleteObject
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
Exports
Exports
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ