Static task
static1
Behavioral task
behavioral1
Sample
8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea.dll
Resource
win10v2004-20230703-en
General
-
Target
8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea
-
Size
2.7MB
-
MD5
48b85b4ab20b873d81e99228d4a3f2bf
-
SHA1
ce88a530b75688eb8783888130954e1470417490
-
SHA256
8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea
-
SHA512
328698fa0058b198ff09747070243e4290857f3975827d90b69ab4fec8c4e6b2d0434b6c1747175aecf78ca2ad6b107cd7112292e7b27a58e2600c96b39b1717
-
SSDEEP
49152:n0RIJYzWUdouG8+nARsBtSqh7mdsI3ozug+ZDPGKK:n8FbG8xqasI3o0DPG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea
Files
-
8318adae3d4e6a216ad38f6d6c160eb869dcdde82bfadb2b2fa4df2e623bb1ea.dll windows x86
58349de294728911d1d3d8230419e010
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
lstrcpyW
DeleteFileW
LoadLibraryW
FreeLibrary
WaitForMultipleObjects
CreateEventW
SetEvent
IsBadReadPtr
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
CreateFileA
MapViewOfFile
CreateFileMappingW
SetFilePointer
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetPrivateProfileStringW
GetPrivateProfileIntW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
WriteProcessMemory
VirtualFreeEx
VirtualAllocEx
GetLocalTime
WaitForSingleObject
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetVersionExW
MultiByteToWideChar
CreateMutexW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
CreateThread
HeapFree
HeapReAlloc
HeapAlloc
OpenProcess
GetStartupInfoW
CreateProcessW
GetCurrentThread
CreateRemoteThread
GetCurrentProcess
Sleep
OutputDebugStringW
GetTempPathW
WriteFile
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
WritePrivateProfileStringW
HeapSize
SetEndOfFile
ReadFile
GetFileSize
UnmapViewOfFile
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
FlushFileBuffers
GetSystemWindowsDirectoryW
InterlockedCompareExchange
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
InitializeSListHead
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
ResumeThread
GetTempFileNameW
GetVersion
lstrcmpW
FreeResource
ExitProcess
GetACP
MulDiv
FindNextFileA
FindClose
ReleaseMutex
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
HeapDestroy
GetLastError
RaiseException
CloseHandle
DecodePointer
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
CreateFileW
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
user32
PostQuitMessage
IsWindowVisible
IsIconic
GetWindowTextW
EnumWindows
GetClassNameW
GetWindowLongW
AttachThreadInput
PostMessageW
wsprintfW
PostThreadMessageW
PeekMessageW
GetMessageW
SetWindowLongW
ScreenToClient
SetTimer
EnumDisplayMonitors
GetMonitorInfoW
IsWindow
GetWindowThreadProcessId
FindWindowW
PtInRect
CopyRect
GetCursorPos
GetWindowRect
SetForegroundWindow
GetForegroundWindow
BringWindowToTop
SetWindowPos
SetWinEventHook
MoveWindow
GetWindow
SendMessageW
CreateWindowExW
IsChild
DestroyWindow
UpdateLayeredWindow
IsZoomed
CharNextW
SetFocus
GetFocus
GetKeyState
SetCapture
ReleaseCapture
KillTimer
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetClientRect
CreateCaret
GetCaretBlinkTime
SetCaretPos
MapWindowPoints
IntersectRect
UnionRect
GetParent
IsRectEmpty
MonitorFromWindow
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
ShowWindow
EnableWindow
SetPropW
GetPropW
LoadCursorW
LoadImageW
wvsprintfW
SetCursor
InflateRect
OffsetRect
MonitorFromPoint
SetWindowRgn
MessageBoxW
CharPrevW
DrawTextW
SetRect
DestroyIcon
DrawIconEx
GetIconInfo
HideCaret
ShowCaret
ClientToScreen
GetSysColor
GetWindowDC
SetWindowTextW
GetWindowTextLengthW
CreateAcceleratorTableW
InvalidateRgn
FillRect
RemovePropW
FindWindowExW
IsWindowEnabled
advapi32
RegEnumKeyExW
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegGetValueW
GetTokenInformation
RegCreateKeyW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
shell32
ord165
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoCreateInstance
CoCreateGuid
oleaut32
VariantInit
SafeArrayCreate
SafeArrayPutElement
VariantClear
SysAllocString
shlwapi
StrTrimA
StrCmpNIW
SHSetValueA
SHGetValueA
SHAutoComplete
StrStrIA
PathRemoveFileSpecW
StrStrIW
PathAppendW
PathCombineW
PathFileExistsW
SHGetValueW
PathFindFileNameW
StrCmpIW
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
VerQueryValueW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
gdiplus
GdipDrawEllipseI
GdipLoadImageFromFile
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItem
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawRectangleI
GdipDrawPath
GdipFillEllipseI
GdipClosePathFigure
GdipCreateTexture
GdipCloneImage
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipCloneBitmapAreaI
GdipAddPathArc
GdipBitmapLockBits
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectRectI
GdipDrawImagePointsI
GdipFillPath
GdipGraphicsClear
GdipSetInterpolationMode
GdipBitmapUnlockBits
GdipGetPropertyItemSize
msimg32
AlphaBlend
GradientFill
comctl32
_TrackMouseEvent
ImageList_DrawEx
InitCommonControlsEx
ord17
gdi32
BitBlt
CreateCompatibleDC
CreateFontIndirectW
CreatePen
DeleteDC
DeleteObject
GetStockObject
Rectangle
RestoreDC
SaveDC
SelectObject
GetTextMetricsW
GetObjectW
SetWindowOrgEx
GetDeviceCaps
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
StretchBlt
SetStretchBltMode
SetTextColor
CreateDIBSection
SetDIBColorTable
TextOutW
ExtTextOutW
CreateDCW
GetDIBits
SetDIBitsToDevice
CreateSolidBrush
CreateCompatibleBitmap
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ