Static task
static1
Behavioral task
behavioral1
Sample
6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31.dll
Resource
win10v2004-20230703-en
General
-
Target
6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31
-
Size
1.9MB
-
MD5
a98966284ea6f3b9e1f1b0c511841b8f
-
SHA1
2befd0aaf45bd960daec40697dd558e02a5b4d1c
-
SHA256
6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31
-
SHA512
b1efaea625e147e384b4e3fa2a18cccf019638e2bab2ae5f49ee939ae22a2be7fabf1d14f11909f3df1cf43af181313f3055f78a7bfb15003a2c78c1e6ff5f67
-
SSDEEP
49152:sDQyutdyw3ONkSqh7mdsI3ozug+ZDPnO:s1utdywIDqasI3o0DP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31
Files
-
6baa0a59a0dfd4ace124b8f8fe42e42f19080dc0e6930e72a620ec7b8d570d31.dll windows x86
bf9f62afad1c316b1d9a4d0531d37227
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
CreateThread
SetEvent
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetVersionExW
MultiByteToWideChar
CreateMutexW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
CreateFileMappingW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetStartupInfoW
CreateProcessW
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapAlloc
GetCurrentProcess
Sleep
OutputDebugStringW
WriteFile
SetEndOfFile
ReadFile
CreateFileA
CreateEventW
WideCharToMultiByte
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
HeapReAlloc
lstrcpyW
DeleteFileW
LoadLibraryW
FreeLibrary
WaitForMultipleObjects
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
FlushFileBuffers
GetSystemWindowsDirectoryW
InterlockedCompareExchange
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
InitializeSListHead
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
FreeResource
ExitProcess
GetACP
FindNextFileA
FindClose
ReleaseMutex
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapDestroy
GetLastError
RaiseException
CloseHandle
DecodePointer
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
OpenFileMappingW
GetFileSizeEx
CreateFileW
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
wsprintfW
PostThreadMessageW
PeekMessageW
GetMessageW
GetWindowThreadProcessId
FindWindowW
advapi32
RegGetValueW
RegEnumKeyExW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegEnumKeyExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoCreateGuid
shlwapi
StrTrimA
StrCmpNIW
SHSetValueA
SHGetValueA
StrStrIA
PathRemoveFileSpecW
StrStrIW
PathAppendW
PathCombineW
PathFileExistsW
StrCmpIW
SHGetValueW
PathIsDirectoryW
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
VerQueryValueW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
Sections
.text Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ