Static task
static1
Behavioral task
behavioral1
Sample
9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b.dll
Resource
win10v2004-20230915-en
General
-
Target
9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b
-
Size
748KB
-
MD5
f7053220266fb83f794fb33903357633
-
SHA1
8ecdd87520391e8ac94c11f8194755bf286eace8
-
SHA256
9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b
-
SHA512
b5b1fc02aa1d0af7f97384ec9a458fd5cbe6ce5b5bb111771417edc52b581498d7612fa77d9af99e55733eca6877bb787fe8797aae030ada73db453e4179e823
-
SSDEEP
12288:fDatPn4v05v3fdTF1Lw+LoGZ/4Z2mRu+5Zs4vhxq7aAY5:7Eh3fG+BiCAx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b
Files
-
9a5d346fd6b72fd8b295d0f2da712c76d843a674c0fbeb23054302ce6219fb8b.dll windows:6 windows x64
f28ea98054055fe587cce9485edb75d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ws2_32
setsockopt
kernel32
CloseHandle
CreateFileW
GetLastError
GetFileSize
ReadFile
WriteFile
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CreateDirectoryW
LoadLibraryW
GetProcAddress
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
GetModuleHandleW
GetModuleFileNameW
FindFirstFileW
FindClose
MoveFileExW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCommandLineW
IsBadCodePtr
WideCharToMultiByte
MultiByteToWideChar
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
HeapAlloc
GetProcessHeap
HeapFree
FlushInstructionCache
VirtualProtect
HeapCreate
Thread32Next
DeleteFileW
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
GetThreadContext
GetCurrentProcessId
SetThreadContext
OpenThread
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
ReadConsoleW
SetEndOfFile
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetFileSizeEx
SetFilePointerEx
SetStdHandle
GetTimeZoneInformation
GetFileType
GetStdHandle
DisableThreadLibraryCalls
WriteConsoleW
LCMapStringW
Thread32First
InitializeCriticalSectionEx
WaitForSingleObjectEx
GetNativeSystemInfo
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
RtlPcToFileHeader
RaiseException
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
FindFirstFileExW
FindNextFileW
ExitProcess
CompareStringW
user32
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
SetWindowPos
GetForegroundWindow
IsIconic
SendMessageTimeoutW
SendMessageW
LoadIconW
CheckMenuRadioItem
SetMenuItemInfoW
DrawMenuBar
DestroyMenu
InsertMenuItemW
LoadMenuW
GetSystemMenu
CallNextHookEx
GetClassNameW
UnhookWindowsHookEx
SetWindowsHookExW
shell32
ShellExecuteW
iphlpapi
GetAdaptersAddresses
Sections
.text Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ