Static task
static1
Behavioral task
behavioral1
Sample
8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50.dll
Resource
win10v2004-20230915-en
General
-
Target
8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50
-
Size
97KB
-
MD5
5901d00c5ee76567e928215546ae9338
-
SHA1
60b8a685c7fb75b14a83f073594ac4afdb41e7be
-
SHA256
8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50
-
SHA512
d301cd7885329bb8827b4c3b49f821698af751281c14eb577b5bfc27d3e4d0d603cd1f6161b5f00a0770365294ed027a6e6c86446e3e9cfead760cac0eb1b9a8
-
SSDEEP
3072:cJNHsjyIQoqHEN85DcXufn+A48NDC6D+t5kv/n:cbQpf9N8YufR4y9D+t5+v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50
Files
-
8fae17f9f7360b7addf77dca529e71fe835d7fbc53b8b3c8b91e21472b884f50.dll windows:5 windows x64
1b90e661ed2f158d2bcc0249f2201831
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
msvcrt
srand
strncpy
fopen
fclose
strncmp
strtok
_time64
realloc
__pctype_func
tolower
_errno
strtol
_initterm
_iob
___lc_handle_func
___lc_codepage_func
_lock
_unlock
_isatty
fflush
_fileno
?terminate@@YAXXZ
ceil
log10
_clearfp
memset
memcpy
strrchr
__C_specific_handler
memmove
__CxxFrameHandler
fread
abort
rand
atoi
malloc
_callnewh
_strrev
_CxxThrowException
free
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
CryptImportPublicKeyInfo
CryptDecodeObjectEx
kernel32
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleExW
GetModuleHandleW
EnterCriticalSection
RtlVirtualUnwind
LeaveCriticalSection
FreeLibrary
GetProcAddress
VirtualFree
GetModuleHandleA
Sleep
GetLastError
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
WaitForSingleObject
CloseHandle
GetTickCount
DisconnectNamedPipe
MultiByteToWideChar
OpenProcess
GetCurrentProcess
TerminateProcess
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32First
Process32Next
ReadFile
GetLogicalDrives
GetCurrentProcessId
CreateThread
VirtualProtect
PeekNamedPipe
OutputDebugStringA
GetModuleFileNameA
GetComputerNameA
GetVersionExA
GetACP
GetOEMCP
LocalFree
ExitProcess
ExitThread
GetCurrentThreadId
advapi32
GetUserNameA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptImportKey
CryptGenRandom
CryptGetHashParam
CryptSetHashParam
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CheckTokenMembership
LookupAccountSidA
FreeSid
AllocateAndInitializeSid
GetTokenInformation
RevertToSelf
CryptEncrypt
CryptGetKeyParam
CryptAcquireContextA
ImpersonateLoggedOnUser
OpenProcessToken
wininet
InternetOpenA
InternetConnectA
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionA
InternetSetOptionA
InternetSetStatusCallback
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetCloseHandle
ws2_32
ntohs
WSASocketA
WSAIoctl
WSAStartup
closesocket
ntohl
htons
htonl
send
ioctlsocket
recv
shutdown
WSAGetLastError
__WSAFDIsSet
accept
WSACleanup
select
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ