Static task
static1
Behavioral task
behavioral1
Sample
8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412.dll
Resource
win10v2004-20230915-en
General
-
Target
8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412
-
Size
137KB
-
MD5
e0077b1f4147787020f0f9e24d4f0dd9
-
SHA1
506f00287f4ec0bc59555bfaa653a347ec192969
-
SHA256
8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412
-
SHA512
4ce3d378cc62d4fe1b25ae5a9327e6a13f815ac68cba36e7e831a279c0d6d8740bd2384f07053a6b587cf1c4d887eb8ac243951372f7c30f12fd0413ede29745
-
SSDEEP
3072:bS+PTNp+6VF4aslr7FB6Z2uVPSh2mY458PAXT+HHqd:u+7NxslrZBi2UO2NHKd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412
Files
-
8dbf324d298b2f2facb3f132620f878b9e2260c44cbeb2b14fa71b3156fba412.dll windows:6 windows x86
556238c4b4fc53ff9ff22a04766e3c62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
InitializeCriticalSectionEx
HeapSize
MultiByteToWideChar
GetLastError
DisableThreadLibraryCalls
LockResource
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
HeapFree
LoadLibraryExW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
GetProcAddress
FreeLibrary
IsBadReadPtr
SetEndOfFile
CreateFileW
GetConsoleOutputCP
GetModuleHandleW
SizeofResource
WriteFile
FlushFileBuffers
GetStringTypeW
SetStdHandle
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedFlushSList
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ReadFile
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
CloseHandle
WideCharToMultiByte
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
CompareStringW
LCMapStringW
WriteConsoleW
advapi32
GetUserNameW
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
zlib1
uncompress
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ