Static task
static1
Behavioral task
behavioral1
Sample
exploit-main.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
exploit-main.dll
Resource
win10v2004-20230915-en
General
-
Target
exploit-main.dll
-
Size
10.1MB
-
MD5
7f55ec2bdc0c13477ccc69099995758a
-
SHA1
91f85b2f9ae4a388d63dffe870d357f3069d2b0e
-
SHA256
49ee698cb08b490f714f473e97c8fa93191e62696b8671c8cace932006e103c5
-
SHA512
656eab4917cc386ae4c7d724419ff142340fca5e51213832fea9f0d6ee2084912482cea088bea76df5913ce0b5d1a2eeef9f47b6b00cac13fbabc0bdeb5c61c9
-
SSDEEP
196608:569pAe3AqahekPqtbtm4iLfbxtI4QN+3+vjrW:EvvwLhe6qzkLTxtVQN+Ovf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource exploit-main.dll
Files
-
exploit-main.dll.dll windows:6 windows x86
7e9776a8e6062ad422d857117a4a92ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
CryptAcquireContextA
dbghelp
StackWalk
user32
CallWindowProcA
CharUpperBuffW
shell32
ShellExecuteA
gdi32
CreateRectRgn
ws2_32
WSACleanup
shlwapi
PathMatchSpecA
crypt32
CertAddCertificateContextToStore
msvcp140
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
imm32
ImmGetContext
d3dcompiler_47
D3DCompile
dwmapi
DwmIsCompositionEnabled
wldap32
ord301
normaliz
IdnToAscii
vcruntime140
_CxxThrowException
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
api-ms-win-crt-runtime-l1-1-0
__sys_errlist
api-ms-win-crt-filesystem-l1-1-0
_access
api-ms-win-crt-heap-l1-1-0
_callnewh
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-string-l1-1-0
_strdup
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-environment-l1-1-0
getenv
Sections
.text Size: - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 706KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.met Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.&f% Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xW% Size: 10.1MB - Virtual size: 10.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 223B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ