Static task
static1
Behavioral task
behavioral1
Sample
e6d0ad0efa3bf9ef1946431c74d0dae0_dll32_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e6d0ad0efa3bf9ef1946431c74d0dae0_dll32_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
e6d0ad0efa3bf9ef1946431c74d0dae0_dll32_JC.dll
-
Size
108KB
-
MD5
e6d0ad0efa3bf9ef1946431c74d0dae0
-
SHA1
cefab1964d34fe99d9c9541c8f11b8ed3b3e00ba
-
SHA256
1c576a5bb242c05516898b7b77ff7275a7b7ff87d5a50229670b5f8783393240
-
SHA512
54049691c40b8b7c44297ed3aef6cce762e4721fadb6d37bb0931ab4a2f5013c4ff113297aed532dba616e8f1b0882e8e88bdb335fbd4a676eb2f061cb916750
-
SSDEEP
1536:pzcpOG4B603b5evPIqvLSpOkpD3aW4kpdau1z1JajxmzsWzXWcdDsYaFAC7cO:pzcpO7g3spO+3aW4k51JaGDsYaFv7V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6d0ad0efa3bf9ef1946431c74d0dae0_dll32_JC.dll
Files
-
e6d0ad0efa3bf9ef1946431c74d0dae0_dll32_JC.dll.dll windows:5 windows x86
d837da076ac873657ecd79e98e806c0e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
processhacker.exe
_PhConcatStrings2@8
WindowsVersion
_PhReAllocate@8
_PhCreateProcessWin32Ex@40
@PhxfDivideSingle2U@12
PhFormatString
PhApplicationFont
_PhInitializeGraphState@4
_PhInitializeCircularBuffer_ULONG@8
_PhGetPluginCallback@8
_PhGetPhVersion@0
_PhSiSetColorsGraphDrawInfo@12
_PhUnregisterCallback@8
_PhDeleteGraphState@4
_PhGraphStateGetDrawInfo@12
_PhAddLayoutItemEx@32
_PhQueueItemWorkQueue@12
_PhDeleteWorkQueue@4
_PhSetGraphText@24
_PhInitializeWorkQueue@16
_PhCreateBytesEx@8
PhMainWndHandle
_PhInitializeLayoutManager@8
_PhDeleteLayoutManager@4
_PhAllocate@4
_PhCreateThread@12
_PhSaveWindowPlacementToSetting@12
_PhInitializeStringBuilder@8
_PhGetWindowText@4
PhAppendFormatStringBuilder
_PhDeleteAutoPool@4
_PhTerminateProcess@8
_PhGetIntegerPairSetting@4
_PhLoadWindowPlacementFromSetting@12
_PhRemoveStringBuilder@12
_PhDrainAutoPool@4
_PhAddLayoutItem@16
_PhAppendCharStringBuilder@8
_PhaConcatStrings2@8
_PhInitializeAutoPool@4
_PhCenterWindow@8
_PhFree@4
_PhDeleteStringBuilder@4
PhaFormatString
_PhAppendStringBuilder2@8
_PhAppendStringBuilder@8
_PhLayoutManagerLayout@4
_PhDereferenceObject@4
_PhShellExecute@12
_PhSetIntegerSetting@8
_PhGetIntegerSetting@4
_PhInsertEMenuItem@12
_PhPluginCreateEMenuItem@20
_PhFindEMenuItem@16
_PhAddSettings@8
_PhGetGeneralCallback@4
_PhIndexOfEMenuItem@8
_PhRegisterCallback@16
_PhRegisterPlugin@12
ntdll
NtReadFile
NtSetInformationObject
RtlOemStringToUnicodeString
RtlIpv6AddressToStringW
NtClose
RtlIpv4AddressToStringW
RtlFreeUnicodeString
RtlUnwind
kernel32
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryExW
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
TlsSetValue
MultiByteToWideChar
WideCharToMultiByte
HeapFree
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
GetLastError
GetModuleFileNameW
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
SetLastError
TlsGetValue
HeapAlloc
GetACP
GetFileType
LCMapStringW
GetModuleHandleExW
CreateFileW
RaiseException
CloseHandle
MulDiv
GetStdHandle
CreatePipe
WriteConsoleW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
WriteFile
HeapReAlloc
HeapSize
SetStdHandle
GetStringTypeW
GetCommandLineW
GetCommandLineA
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
TlsFree
user32
DestroyWindow
DialogBoxParamW
SetDlgItemInt
GetDlgItemInt
EndDialog
SetForegroundWindow
GetParent
PostQuitMessage
GetDlgItem
MapDialogRect
TranslateMessage
SetPropW
PostMessageW
GetDC
CreateWindowExW
GetSystemMetrics
DestroyIcon
GetDlgCtrlID
SetDlgItemTextW
SetWindowLongW
GetSysColorBrush
SystemParametersInfoW
LoadImageW
InvalidateRect
ReleaseDC
GetMessageW
CreateDialogParamW
GetWindowLongW
GetPropW
SendMessageW
RemovePropW
SetWindowTextW
ShowWindow
DispatchMessageW
IsDialogMessageW
gdi32
SetBkColor
GetStockObject
DeleteObject
SetBkMode
GetDeviceCaps
CreateFontW
SelectObject
SetTextColor
iphlpapi
IcmpCloseHandle
Icmp6SendEcho2
Icmp6CreateFile
IcmpSendEcho2
IcmpCreateFile
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReceiveResponse
advapi32
SystemFunction036
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE