Static task
static1
Behavioral task
behavioral1
Sample
7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709.dll
Resource
win10v2004-20230703-en
General
-
Target
7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709
-
Size
1.9MB
-
MD5
09c12efb98611d4400e731419cd477d5
-
SHA1
4daf32ce92eef7468d9ca268161211e5b166cc60
-
SHA256
7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709
-
SHA512
a01c5ea33268863d11e58bfda55b8ed1df33a00950c59e8dd955b06a241d660b10b42a32f40727810871e42c13a78ac85080a27e1fc721caf34c225e03bb293c
-
SSDEEP
49152:ODQyutdyw3O2kSqh7mdsI3ozug+ZDPnO:O1utdywLDqasI3o0DP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709
Files
-
7beadd9ce485c34171502f0c2a216d085ae73898219b8fc13efb71262de51709.dll windows x86
bf9f62afad1c316b1d9a4d0531d37227
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
CreateThread
SetEvent
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetVersionExW
MultiByteToWideChar
CreateMutexW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
CreateFileMappingW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetStartupInfoW
CreateProcessW
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapAlloc
GetCurrentProcess
Sleep
OutputDebugStringW
WriteFile
SetEndOfFile
ReadFile
CreateFileA
CreateEventW
WideCharToMultiByte
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
HeapReAlloc
lstrcpyW
DeleteFileW
LoadLibraryW
FreeLibrary
WaitForMultipleObjects
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
FlushFileBuffers
GetSystemWindowsDirectoryW
InterlockedCompareExchange
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
InitializeSListHead
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
FreeResource
ExitProcess
GetACP
FindNextFileA
FindClose
ReleaseMutex
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapDestroy
GetLastError
RaiseException
CloseHandle
DecodePointer
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
OpenFileMappingW
GetFileSizeEx
CreateFileW
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
wsprintfW
PostThreadMessageW
PeekMessageW
GetMessageW
GetWindowThreadProcessId
FindWindowW
advapi32
RegGetValueW
RegEnumKeyExW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegEnumKeyExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoCreateGuid
shlwapi
StrTrimA
StrCmpNIW
SHSetValueA
SHGetValueA
StrStrIA
PathRemoveFileSpecW
StrStrIW
PathAppendW
PathCombineW
PathFileExistsW
StrCmpIW
SHGetValueW
PathIsDirectoryW
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
VerQueryValueW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
Sections
.text Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ