Static task
static1
Behavioral task
behavioral1
Sample
3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f.dll
Resource
win10v2004-20230703-en
General
-
Target
3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f
-
Size
498KB
-
MD5
d5621a243c28d703d02521cb6a176f4d
-
SHA1
dc74dea58f3caac3b1a21a90a92765bb2c8eaea2
-
SHA256
3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f
-
SHA512
b42a8a7678f9728d608f1aa9f7c3019a8c65324fb56fa31c5eeeba3c3ee9412a807c2f2b67612e30e60e05e78e8405627054947f7582a14fe72531de43d32b28
-
SSDEEP
6144:VbKG6HIesBw1O15KdbMSBudLqzbqRUr732e7vWydaF2iMfgwjpbLxg1ohGhzCkoY:VORfs750kqqRUr73203e2iMfdOo4QUq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f
Files
-
3725f1b05551f3b2ff281013c2c231bf95ba404c08207b1138a7f6b74ff8212f.dll windows x64
06e1797f1ef15217ef4798fa9716e422
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
GlobalLock
GlobalUnlock
FreeLibrary
GetCurrentThreadId
Process32First
TerminateProcess
GetFinalPathNameByHandleW
Module32Next
Thread32Next
Thread32First
Module32First
CreateToolhelp32Snapshot
K32GetModuleFileNameExA
Process32NextW
K32GetModuleBaseNameW
CreateFileA
Process32Next
Process32FirstW
LoadLibraryW
K32EnumProcesses
WriteFile
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
CreateFileW
SetStdHandle
HeapSize
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
OutputDebugStringW
SetEnvironmentVariableW
CreatePipe
GetFileAttributesExW
MultiByteToWideChar
WaitForSingleObject
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
ExitProcess
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
CreateProcessW
DuplicateHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
GetCPInfo
GetStringTypeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
GlobalFree
GlobalAlloc
FindFirstVolumeW
QueryDosDeviceW
GetEnvironmentStringsW
GetTickCount
VirtualFreeEx
GetProcessHeap
ReadProcessMemory
VirtualAllocEx
GetProcAddress
HeapAlloc
GetNativeSystemInfo
K32GetModuleBaseNameA
CloseHandle
LoadLibraryA
OpenMutexA
GetLastError
GetTickCount64
Sleep
OpenProcess
CreateSymbolicLinkA
CreateMutexA
GetCurrentProcess
GetModuleHandleA
HeapFree
CreateHardLinkA
GetExitCodeProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
InitializeCriticalSectionEx
QueryPerformanceFrequency
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
RtlUnwind
user32
EnableWindow
CloseWindow
GetCursorPos
UpdateWindow
AllowSetForegroundWindow
keybd_event
GetKeyboardState
IsWindow
AttachThreadInput
SystemParametersInfoA
GetDesktopWindow
SetForegroundWindow
GetKeyState
DispatchMessageA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetMouseMovePointsEx
TranslateMessage
mouse_event
PeekMessageA
SetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
EnumClipboardFormats
GetClipboardData
GetClipboardSequenceNumber
SetClipboardData
PtInRect
GetRawInputDeviceList
GetWindowThreadProcessId
GetSystemMenu
GetRawInputDeviceInfoW
LoadImageA
GetWindow
EnumDisplayDevicesA
FindWindowExW
GetLastInputInfo
GetWindowRect
IsWindowVisible
SetWindowPos
EnumChildWindows
GetSystemMetrics
GetClassNameA
WindowFromPoint
ShowWindow
GetClassLongA
SetWindowLongA
ExitWindowsEx
GetWindowTextA
GetWindowLongA
LockWorkStation
SetWindowTextA
MessageBoxA
BlockInput
GetTopWindow
EnumDisplaySettingsA
GetForegroundWindow
IsWindowEnabled
MoveWindow
SetLayeredWindowAttributes
FindWindowW
SendMessageA
GetParent
FindWindowA
gdi32
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
CreateCompatibleBitmap
SelectObject
CreateDCA
GetDIBits
GetDeviceCaps
GetPixel
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
RegCreateKeyA
RegDeleteTreeA
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegEnumKeyExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegEnumValueA
AdjustTokenPrivileges
shell32
DragQueryFileA
ShellExecuteA
SHFileOperationA
ExtractIconA
ord680
ole32
CoCreateInstance
CoInitialize
ws2_32
ntohs
iphlpapi
GetTcpTable2
GetExtendedUdpTable
setupapi
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 367KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ