KillMain
Static task
static1
Behavioral task
behavioral1
Sample
21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4.dll
Resource
win10v2004-20230915-en
General
-
Target
21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4
-
Size
1.4MB
-
MD5
af57d1e21d2566804a2b4aa7219ae658
-
SHA1
8fdf3b6d26aabc7d60e8daa4f82b875c85e92686
-
SHA256
21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4
-
SHA512
43803f0ec9db36a6904c5d902842d59ed86e884e44bdb0db21176876b77cfd81bb8939bcbd2d3e3fe471edd8e4edb42c992a6500bd8767ea4b28eb10c4af6acc
-
SSDEEP
12288:eGvYR8rwDfkmg7VF8Fyb5qpaqSRrixCkMrGj4+U7UcedeKFmiUj88RMGkd:3vDwDfa7oFS5iaqSTkMrGkF7UcI1P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4
Files
-
21c059f701a741588b9074739a9bf4bf513cd5f552a609f76044a1d22f76ada4.dll windows:4 windows x64
a845f3bdec910612e71659ecdadcd98e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
CloseServiceHandle
ControlService
DeleteService
EnumServicesStatusExA
FreeSid
GetNamedSecurityInfoW
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclW
SetNamedSecurityInfoW
kernel32
AddAtomA
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateMutexA
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
FindAtomA
FormatMessageA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetLastError
SetPriorityClass
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
__C_specific_handler
msvcrt
___lc_codepage_func
___mb_cur_max_func
__iob_func
_amsg_exit
_beginthreadex
_close
_endthreadex
_errno
_fdopen
_filelengthi64
_fileno
_fileno
_fstat64
_initterm
_localtime64
_lock
_lseeki64
_memccpy
_onexit
_pclose
_popen
_read
_setjmp
_strdup
_strnicmp
_time64
_ultoa
_unlock
_wfopen
_write
abort
calloc
exit
fclose
feof
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putwc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strerror
strftime
strlen
strncmp
strstr
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
psapi
EnumDeviceDrivers
GetDeviceDriverBaseNameA
shell32
ShellExecuteA
ShellExecuteExA
shlwapi
PathCombineA
Exports
Exports
Sections
.text Size: 805KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 454KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ