Static task
static1
Behavioral task
behavioral1
Sample
014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe.dll
Resource
win10v2004-20230915-en
General
-
Target
014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe
-
Size
3.8MB
-
MD5
d64722caf6776f79bdb289a8bfb522ef
-
SHA1
5507eb1cc01767e2aab6ef1a676790584756731b
-
SHA256
014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe
-
SHA512
97d3ad9ac23bd739d792487b708da5ac41802db302072757f775880bd8c7a41e6ccbcd663488d4302f6e98c11a679e3dfd372fc434ed382f26878150601a6327
-
SSDEEP
98304:2ACbPSK7wrpkViQRsHLcdh2towBcJxA/jmtk9n:2ACb9eUhR8Lc9RJUjR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe
Files
-
014b88397c0e861f0589f922cb117a5744aa287fcc6be35d80adbbcfc1adf9fe.dll windows x64
3eecea123e203050235fad0fe110dd73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
GetCurrentProcess
VirtualAlloc
Sleep
CloseHandle
CreateThread
ReadProcessMemory
GetModuleHandleW
IsBadReadPtr
TerminateProcess
WritePrivateProfileStringA
GetLocalTime
GetCurrentProcessId
GetPrivateProfileIntA
GetPrivateProfileStringA
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetMessageW
ShowWindow
DestroyWindow
MessageBoxW
UpdateWindow
FindWindowA
GetClientRect
GetAsyncKeyState
GetDlgItemTextA
DispatchMessageW
MessageBoxA
TranslateMessage
mouse_event
CreateDialogParamW
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
d3dx9_42
D3DXVec3Project
ws2_32
recv
htons
socket
send
inet_addr
WSAStartup
closesocket
connect
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memmove
memcpy
memcmp
__std_exception_destroy
__std_exception_copy
__C_specific_handler
_CxxThrowException
memset
__std_type_info_destroy_list
memchr
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_initterm_e
_initterm
_cexit
_crt_atexit
_execute_onexit_table
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
exit
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-heap-l1-1-0
malloc
free
_callnewh
api-ms-win-crt-math-l1-1-0
sqrt
Sections
.text Size: - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.i[{ Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.-Wy Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.KY5 Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ