Static task
static1
Behavioral task
behavioral1
Sample
Malicious_34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024.dll
Resource
win10v2004-20230621-en
General
-
Target
Malicious_34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024.dll
-
Size
48KB
-
MD5
97337e12bdaa3af925ccd5a9d4e94ebb
-
SHA1
c068be3e54db55a012926fdb78db80253f9f22b6
-
SHA256
34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024
-
SHA512
1442aee2a3cc987496032e6df8dec6d7f0bd7b858168e3dd543c6c65c4946e8fbe378b4b4f43e6a937be18f9ea6f3a37989c97876e54920335668828468553c3
-
SSDEEP
768:DTwPxzjYStbxIKa+EujlT+lknUORL/xhwFF27+AG5GiIo1AIUXnkDckKee9GyeQ:YjYUlTwORLJhCM7+JGip1AIq3/31
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024.dll
Files
-
Malicious_34759f20f4574e829d68fd2a1171691b86558850e2df65d9c20434445ae36024.dll.dll windows x64
cffc1d72b08be7bc4d3fc90d1030adc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetWindowsDirectoryA
GetModuleFileNameA
HeapAlloc
FreeLibrary
GetProcessHeap
HeapFree
VirtualFree
VirtualProtect
VirtualAlloc
GetLastError
GetCurrentProcess
IsBadReadPtr
Process32First
GetCurrentProcessId
ProcessIdToSessionId
SetFilePointer
Sleep
Process32Next
HeapReAlloc
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RtlUnwindEx
RtlLookupFunctionEntry
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
DecodePointer
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
FlsGetValue
FlsFree
FlsAlloc
GetModuleHandleW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
LoadLibraryW
GetConsoleCP
GetConsoleMode
GetStringTypeW
HeapSize
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
CreateToolhelp32Snapshot
GetProcAddress
LoadLibraryA
WriteFile
CloseHandle
SetLastError
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 186KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ