Static task
static1
Behavioral task
behavioral1
Sample
5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f.dll
Resource
win10v2004-20230703-en
General
-
Target
5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f
-
Size
533KB
-
MD5
8a50edb679eedcdfb25ae4e90a4c8d89
-
SHA1
a651fe24016133da1a401d0035294eaca58b32c7
-
SHA256
5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f
-
SHA512
55030d4ad7f02a12d38b325cee213f09e44566b21a3e44dd4923f7037dab25f6d9bd033f88f1de6d9fd4522c245ccc5c1b362b2e85475d69868bc8c65ee52de8
-
SSDEEP
12288:Rm/FjJJdG7y890BSamLdBWHLIsG4FXzGZsj7auu:RCJM7ygzIrIz4FDbj7auu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f
Files
-
5de025fb81b06bddef0c25724a48fa19eb2f990be47500f4e1e0e6b62ef8ec0f.dll windows x86
61bda95c701c5f2af14b9f5f9977fbeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFileTime
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
CompareStringW
lstrlenA
WritePrivateProfileStringW
GlobalFlags
GetVersionExA
GlobalFindAtomW
FindFirstFileA
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetCommandLineA
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetFullPathNameA
GetCurrentDirectoryA
GetFileSizeEx
HeapDestroy
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
GetThreadContext
SetThreadContext
FlushInstructionCache
InterlockedCompareExchange
GetFileAttributesW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
GlobalAddAtomW
SuspendThread
ResumeThread
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GetModuleHandleW
SetLastError
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
LoadLibraryW
LoadLibraryExA
FlushFileBuffers
GetVolumeInformationA
CreateProcessA
CreatePipe
GetVolumeInformationW
WriteFile
ReadFile
SetFilePointer
CreateFileA
DeviceIoControl
CreateFileW
GetModuleFileNameW
GetDriveTypeW
GetDriveTypeA
FindFirstFileW
TlsFree
TlsAlloc
GlobalUnlock
GlobalLock
TlsSetValue
TlsGetValue
VirtualProtect
FreeLibrary
InterlockedDecrement
InterlockedIncrement
ResetEvent
OpenEventA
OutputDebugStringW
QueryDosDeviceA
OpenSemaphoreW
DeleteCriticalSection
TerminateThread
InitializeCriticalSection
Sleep
OpenFileMappingW
GetCurrentThread
ReleaseSemaphore
LoadLibraryExW
WaitForSingleObject
CreateThread
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CloseHandle
UnmapViewOfFile
MapViewOfFile
GetLastError
OutputDebugStringA
VirtualQuery
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
LeaveCriticalSection
HeapCreate
EnterCriticalSection
user32
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
GetDlgItem
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassW
UnhookWindowsHookEx
CharUpperW
GetSystemMetrics
GetWindowThreadProcessId
GetWindowLongW
MessageBoxA
GetSubMenu
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
GetMenuState
GetMenuItemID
GetForegroundWindow
IsWindow
RemovePropW
GetPropW
SetPropW
GetClassLongW
GetCapture
WinHelpW
LoadIconW
GetMenuItemCount
RegisterWindowMessageW
DestroyMenu
ShowWindow
TabbedTextOutW
gdi32
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
DragQueryFileW
shlwapi
PathFileExistsA
PathRemoveFileSpecW
PathFindExtensionW
PathIsDirectoryW
PathRemoveFileSpecA
PathFindFileNameW
PathStripToRootW
ord219
PathIsUNCW
ole32
ReleaseStgMedium
CoInitialize
CoCreateInstance
CoTaskMemFree
oleaut32
VariantChangeType
VariantClear
VariantInit
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
setupapi
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
CM_Get_Parent
CM_Get_Device_IDA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
Sections
.text Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ