Static task
static1
Behavioral task
behavioral1
Sample
c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239.dll
Resource
win10v2004-20230703-en
General
-
Target
c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239
-
Size
1.9MB
-
MD5
6ef87cb5546d989c94be770fe1bc350f
-
SHA1
1894866d29bdc018fbdd0078e630afc915f5e15f
-
SHA256
c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239
-
SHA512
aaa6cdcb4428b1ab9aa2138a522ffed16c0846115c08d820d4fa5a49aada02299ec943e61e70e8ec99ba326ae921ab87db9c4a01faa5675030e72d39a8bfc081
-
SSDEEP
49152:HnmtrVvaLaf7YSqh7mdsI3ozug+ZDPj6A:ArVv9f7fqasI3o0DP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239
Files
-
c5a06037b744336ce208bd79af2a535661e99b44a35b417e98e6d98f99900239.dll windows x86
bf090b9be9a8abe485654a6757b4069f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
CreateThread
SetEvent
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetVersionExW
MultiByteToWideChar
CreateMutexW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
CreateFileMappingW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetStartupInfoW
CreateProcessW
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapAlloc
GetCurrentProcess
Sleep
OutputDebugStringW
WriteFile
SetEndOfFile
ReadFile
CreateEventW
CreateFileA
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
HeapReAlloc
WideCharToMultiByte
DeleteFileW
LoadLibraryW
FreeLibrary
WaitForMultipleObjects
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
FlushFileBuffers
GetSystemWindowsDirectoryW
InterlockedCompareExchange
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
InitializeSListHead
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
ExitProcess
GetACP
FreeResource
FindNextFileA
FindClose
ReleaseMutex
LocalFree
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapDestroy
GetLastError
RaiseException
CloseHandle
DecodePointer
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
OpenFileMappingW
GetFileSizeEx
CreateFileW
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
wsprintfW
PostThreadMessageW
PeekMessageW
GetMessageW
GetWindowThreadProcessId
FindWindowW
advapi32
RegGetValueW
RegEnumKeyExW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegEnumKeyExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoCreateGuid
shlwapi
StrTrimA
StrCmpNIW
SHSetValueA
SHGetValueA
StrStrIA
PathRemoveFileSpecW
StrStrIW
PathAppendW
PathCombineW
PathFileExistsW
StrCmpIW
SHGetValueW
PathIsDirectoryW
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
VerQueryValueW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
Sections
.text Size: 541KB - Virtual size: 541KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ