OnInitFuc
Static task
static1
Behavioral task
behavioral1
Sample
b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9.dll
Resource
win10v2004-20230915-en
General
-
Target
b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9
-
Size
133KB
-
MD5
e873ecc45c3e8d40cbd5eb907b5a143f
-
SHA1
a09dbeef288e7d245530ffb42bba418ac512aaed
-
SHA256
b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9
-
SHA512
c46afb5f15eeb262de5182fae5f8aa3dc31bd06b83f9aa0629e6a39f2a1ea20ab90aa25e1a146e8a446eebd3c399e1715b912dc5821f20844d99b6bf97691045
-
SSDEEP
3072:n3LrZFeWp7r+8ceUXJVJVmR0KBxXrV5njLZTyZr+ICM:n3LrZFeWp7r+8QLJVK085hpTyz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9
Files
-
b128a68c0bed3c17211f984cde78bea109cd77e99cd5394f60be4b4d4cf8d5a9.dll windows:5 windows x64
bc0b840228e41218be6d30dc4b8f6d3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
lstrcatW
CloseHandle
CreateThread
HeapReAlloc
FreeLibrary
HeapAlloc
HeapFree
GetModuleHandleW
VirtualFree
GetProcessHeap
IsBadReadPtr
SetLastError
VirtualAlloc
LoadLibraryA
VirtualProtect
GetCurrentProcess
GetTempFileNameW
GetLastError
WriteFile
WideCharToMultiByte
CopyFileW
ReadFile
CreateFileW
GetTempPathW
GetFileAttributesExW
DeleteFileW
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
lstrcmpW
GetModuleFileNameW
GetFileAttributesW
Sleep
GetProcAddress
LoadLibraryW
GetTickCount
GetStringTypeA
GetCurrentThreadId
FlsSetValue
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
HeapCreate
HeapDestroy
ExitProcess
GetStdHandle
GetModuleFileNameA
RaiseException
RtlPcToFileHeader
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
RtlUnwindEx
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
advapi32
LookupAccountSidW
GetTokenInformation
OpenProcessToken
shell32
SHGetFolderPathW
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
hesyrrY Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 938B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ