Static task
static1
Behavioral task
behavioral1
Sample
c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5.dll
Resource
win10v2004-20230703-en
General
-
Target
c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5
-
Size
141KB
-
MD5
25b20742137bbd9055ecc08959c036dc
-
SHA1
01b86c6556426721584638e10a2fac46513b9d7c
-
SHA256
c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5
-
SHA512
65b83e00949ac14d24011fd03f4d5cc2dd74c119eef80195a11c975bfe2ab6d3fc1ed4af83d872be2b72fdcb9b4f5842b86cf72f6b142066bdf583a93a9f3710
-
SSDEEP
3072:7P7Oha+1rNsJth8PR7MW8Bewgmg+h16F42sogPtHjN3PtD2t:7P7oY8PR7MbZJg5Fr+tit
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5
Files
-
c3bf091d64a82d314f99d7d4c88c278a2a63683a1ca296c7538ec55e7c28add5.dll windows x86
45719e0793ce847aba356f7a3a602199
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
InitializeCriticalSectionEx
HeapSize
MultiByteToWideChar
GetLastError
DisableThreadLibraryCalls
LockResource
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
HeapFree
LoadLibraryExW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
GetProcAddress
FreeLibrary
IsBadReadPtr
SetEndOfFile
CreateFileW
GetConsoleOutputCP
GetModuleHandleW
SizeofResource
WriteFile
FlushFileBuffers
GetFileSizeEx
GetStringTypeW
SetStdHandle
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedFlushSList
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ReadFile
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
CompareStringW
LCMapStringW
CloseHandle
WideCharToMultiByte
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
advapi32
GetUserNameW
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
zlib1
uncompress
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ