check
Static task
static1
Behavioral task
behavioral1
Sample
dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c.dll
Resource
win10v2004-20231020-en
General
-
Target
dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c
-
Size
1.4MB
-
MD5
05f9f11b72ff35ae51ba4498c9bfa59f
-
SHA1
1f6de9f5bbb53fdffa681a3113acd99a33708514
-
SHA256
dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c
-
SHA512
a65a8d899f98bf1e67f2505d1527871e6e14dae8ba2345c716983bcfd6b42de88c5f78d5e9ed9ca72a5d3bc9e4519c54dc1b4589ee6fc609d38355063cae3edd
-
SSDEEP
12288:VjqRUcD+3CPVWvEwH3IHXJ8BgnHixCkMrGj4+U7Ucedex34mdsay0u:FOD+KVWcwHgXJ8BgJkMrGkF7UcI4r2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c
Files
-
dd3dc9d469dd2edd1b345ee5525a127b4a5100c44b03fcce27ee268bf4d7467c.dll windows:4 windows x64
d33425f91d9dcc519ced9462c6abcd0e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
CloseServiceHandle
ControlService
DeleteService
EnumServicesStatusExA
FreeSid
GetNamedSecurityInfoW
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclW
SetNamedSecurityInfoW
kernel32
AddAtomA
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateMutexA
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
FindAtomA
FormatMessageA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetHandleInformation
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
MultiByteToWideChar
OpenProcess
OutputDebugStringA
Process32First
Process32Next
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveVectoredExceptionHandler
ResetEvent
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetLastError
SetPriorityClass
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
__C_specific_handler
msvcrt
___lc_codepage_func
___mb_cur_max_func
__iob_func
_amsg_exit
_beginthreadex
_close
_endthreadex
_errno
_fdopen
_filelengthi64
_fileno
_fileno
_fstat64
_initterm
_localtime64
_lock
_lseeki64
_memccpy
_onexit
_pclose
_popen
_read
_setjmp
_strdup
_strnicmp
_time64
_ultoa
_unlock
_wfopen
_write
abort
calloc
exit
fclose
feof
fflush
fgetpos
fgets
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putwc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strerror
strftime
strlen
strncmp
strstr
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
psapi
EnumDeviceDrivers
GetDeviceDriverBaseNameA
shell32
ShellExecuteA
ShellExecuteExA
shlwapi
PathCombineA
user32
GetForegroundWindow
ShowWindow
Exports
Exports
Sections
.text Size: 807KB - Virtual size: 807KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 454KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 66B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ