BasicEntry
Static task
static1
Behavioral task
behavioral1
Sample
fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb.dll
Resource
win10v2004-20230831-en
General
-
Target
fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb
-
Size
4.5MB
-
MD5
5d537254370fb7f3256524e6e74743d0
-
SHA1
e931de448f728bc9910dbb85e91e74e05e7ead0e
-
SHA256
fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb
-
SHA512
c0389f2af34f8f2b95d0c6bfd91e1a53c7e90186c19b15d67571a7cabe76b5a3ddc8cad02ca2354a0d29742fc643b9c90243605ae359ad013dfd486da5beaf15
-
SSDEEP
98304:JAZdwZomsjDGwYYtQddncl5oVb/lbGWRB2A:OQmMYedFcl5oVb/R7B2A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb
Files
-
fd8f87b0b7d9a02fc7afe9a0a3dff67a8f0306e241046bdda8ecca1294e400eb.dll windows x86
3a08be0923e3bc0ac3996a2f9828077b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
CreateEventW
GetDriveTypeW
FlushInstructionCache
GetTimeZoneInformation
SwitchToThread
GetFileInformationByHandle
CompareFileTime
FindCloseChangeNotification
FindFirstChangeNotificationW
SearchPathW
CreateDirectoryW
GetCurrentDirectoryW
SetFileTime
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
GetShortPathNameW
GetPrivateProfileStringW
LocalAlloc
InterlockedCompareExchange
InterlockedExchange
LoadLibraryExW
lstrcmpiW
Sleep
InterlockedDecrement
InterlockedIncrement
DecodePointer
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
WideCharToMultiByte
GetVersionExW
GetModuleHandleW
LoadLibraryW
GetTickCount
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
CreateFileW
ReadFile
GetFileSize
UnlockFile
LockFile
GetModuleFileNameW
WaitForSingleObjectEx
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
SetConsoleCtrlHandler
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
WriteFile
CreateMutexW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
MoveFileExW
MoveFileW
FindNextFileW
FindFirstFileW
DeleteFileW
SetEvent
SetFileAttributesW
GetFullPathNameW
RemoveDirectoryW
GetWindowsDirectoryW
WritePrivateProfileStringW
GetTempPathW
FindResourceExW
FindResourceW
lstrlenW
FindClose
SizeofResource
LoadResource
SetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
DeleteFileA
CreateFileA
FindNextFileA
FindFirstFileExW
FindFirstFileExA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetFileAttributesExW
SetFilePointer
GetDiskFreeSpaceExW
GetFileType
GetStdHandle
GetACP
GetCurrentThread
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlUnwind
lstrcmpA
DeviceIoControl
GetTempFileNameA
GetTempPathA
CloseHandle
GetSystemWindowsDirectoryW
FreeResource
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetPrivateProfileIntW
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
FlushFileBuffers
LoadLibraryExA
VirtualFree
VirtualAlloc
GetEnvironmentVariableW
GetFileAttributesW
MultiByteToWideChar
WaitForMultipleObjects
GetLongPathNameW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
GetLogicalDriveStringsW
QueryDosDeviceW
CopyFileW
OutputDebugStringA
OutputDebugStringW
GetFileSizeEx
GetLocalTime
ResetEvent
GetSystemInfo
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
LocalFree
FormatMessageW
GetSystemDirectoryW
GetTempFileNameW
IsProcessorFeaturePresent
user32
SendMessageW
GetShellWindow
GetWindowThreadProcessId
FindWindowExW
UnregisterClassW
PostMessageW
KillTimer
DestroyWindow
IsDialogMessageW
OffsetRect
GetActiveWindow
EndDialog
DialogBoxParamW
SetTimer
MonitorFromWindow
LoadImageW
GetWindow
MapWindowPoints
SetForegroundWindow
GetSystemMetrics
IsIconic
IsWindowVisible
PostQuitMessage
MessageBoxW
wsprintfW
RegisterWindowMessageW
SendMessageTimeoutW
SendNotifyMessageW
FindWindowW
CopyRect
EqualRect
UnionRect
CallWindowProcW
SetCursor
DrawFocusRect
DestroyCursor
MoveWindow
CharNextW
BringWindowToTop
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
GetParent
SetWindowLongW
GetWindowLongW
ShowWindow
ScreenToClient
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DrawTextW
ReleaseCapture
SetCapture
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
PtInRect
DefWindowProcW
GetMonitorInfoW
GetAsyncKeyState
GetFocus
SetWindowPos
UpdateLayeredWindow
FillRect
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
CreateRectRgnIndirect
DeleteDC
DeleteObject
RestoreDC
EnumFontFamiliesW
SelectClipRgn
SelectObject
SetBkMode
SetTextColor
CreateDIBSection
GetObjectW
SetViewportOrgEx
OffsetViewportOrgEx
RectVisible
SaveDC
CreateFontW
GetStockObject
BitBlt
advapi32
GetTokenInformation
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
DuplicateTokenEx
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
GetTrusteeNameW
BuildExplicitAccessWithNameW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetExplicitEntriesFromAclW
CryptContextAddRef
SetEntriesInAclW
LookupAccountNameW
LookupAccountSidW
DeleteAce
EqualSid
GetUserNameW
shell32
SHBrowseForFolderW
SHCreateDirectoryExW
SHChangeNotify
SHGetPathFromIDListW
ShellExecuteExW
SHGetSpecialFolderPathW
ord165
SHFileOperationW
ShellExecuteW
ole32
CoCreateGuid
CoInitializeSecurity
OleRun
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantInit
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
VariantClear
VariantCopy
shlwapi
SHDeleteValueW
StrCmpNIW
PathIsPrefixW
PathRemoveFileSpecW
SHSetValueW
PathIsRelativeW
PathIsDirectoryW
SHGetValueW
AssocQueryStringW
StrStrIW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
PathCombineW
PathAppendW
PathRenameExtensionA
PathFindFileNameA
StrStrIA
StrTrimA
wnsprintfW
ord12
StrCmpIW
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromFileICM
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipCreateSolidFill
GdipDeleteBrush
GdipFree
GdipAlloc
GdipCloneBrush
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatTrimming
GdipSetStringFormatFlags
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetTextRenderingHint
GdipDrawString
GdipFillRectangleI
GdipMeasureString
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipDrawImageRectRectI
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRect
GdipDrawImagePointRectI
GdipCreatePen1
GdipDeletePen
GdipDrawRectangleI
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromFile
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
setupapi
SetupIterateCabinetW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
secur32
GetUserNameExW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
Exports
Exports
Sections
.text Size: 958KB - Virtual size: 957KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ