Static task
static1
Behavioral task
behavioral1
Sample
6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182.dll
Resource
win10v2004-20230621-en
General
-
Target
6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182
-
Size
168KB
-
MD5
b888229f4023b48a2c425b5a2de7b8cd
-
SHA1
8904a7b421c74e93419a4384d8b026729c2e315b
-
SHA256
6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182
-
SHA512
a08288aa5322a2f0bb8400701d6237a025905529d444867631931ea415c26ca0b7918b43ee8e8e6caa1eeb6106119b9ec55a9b35bccd15f809f957f75d9f8481
-
SSDEEP
3072:6Ty2zS2Xux/v15BYOo6mcLqW4oActBkw:uySS2X231D/rbTBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182
Files
-
6a36e32ce385c5f8620ee42e7a435e4486eb80141d0eb0d6de378f83be7eb182.dll windows x86
8d39cc29fc03ef63eb422a7846da88c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
GetCommandLineA
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapSize
HeapReAlloc
GetACP
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalFree
GlobalFree
CloseHandle
GetModuleFileNameA
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalReAlloc
GlobalAlloc
lstrcpyA
lstrlenA
lstrcmpA
lstrcpynA
GetLastError
SetLastError
GlobalLock
GetFileType
GlobalUnlock
user32
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetClassInfoA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
SetWindowTextA
ClientToScreen
wsprintfA
EnableWindow
GetDesktopWindow
PostQuitMessage
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
LoadStringA
UnregisterClassA
UnhookWindowsHookEx
GetWindowTextA
WinHelpA
GetCapture
GetMenuCheckMarkDimensions
LoadBitmapA
PostMessageA
SendMessageA
SetCursor
MessageBoxA
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetTopWindow
DestroyMenu
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
gdi32
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
odbc32
ord5
ord16
ord61
ord13
ord18
ord12
ord72
ord19
ord3
ord54
ord10
ord11
ord14
ord9
ord15
ord51
ord45
ord50
ord23
ord1
ord2
ord41
ord43
ord68
ord46
ord44
ord8
ord59
ord17
ord20
ord49
ord48
ord4
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE