Static task
static1
Behavioral task
behavioral1
Sample
7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.dll
Resource
win10v2004-20231020-en
General
-
Target
7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.zip
-
Size
1.0MB
-
MD5
fa017fb56c5aa7367344f037eff73808
-
SHA1
9ebb1e64b1088a57de9aaa43c6e453aa5945bcb5
-
SHA256
74c6dcc96cb8a648ab0bc5b250c1821b6cbdd0595a48d96c21049f836d41a076
-
SHA512
b65a29b21fff1c94c833de19c54e1486d6d9e4ffa58141869ad6841b4f3b89ae4bb6c7c2c871295cfae964e5ff0ccf1008eb3aa263e1813e29582669ffb66515
-
SSDEEP
24576:G0d9rfZ3UjB3G+baSabUToNsm8mXn2u9gG2Lz1aZe0mKlj:G0dBx3UrvIzsmXdg5Rq7lj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.dll
Files
-
7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.zip.zip
Password: infected
-
7502affbbb6086a020fe2ffe7b079e7ccf8e7fb11d48960561826054b2e0c1fe.dll.dll windows:5 windows x86
Password: infected
c9ec03d1eaad4e1692358ca05ade2cf2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
DefDriverProc
secur32
InitializeSecurityContextW
kernel32
lstrcmpiA
DeleteFiber
GetOverlappedResult
ExitProcess
FindFirstVolumeW
GetConsoleCP
GetSystemPowerStatus
GetProcessHeap
GetSystemDefaultUILanguage
GetThreadLocale
EnumTimeFormatsA
DeleteFileA
GetCurrentConsoleFont
GetModuleHandleA
OutputDebugStringA
LoadLibraryExW
GetModuleFileNameA
GetBinaryTypeA
WaitForSingleObjectEx
GetBinaryTypeW
GetLogicalDriveStringsW
GetConsoleMode
VirtualProtectEx
winspool.drv
DeletePrinterDriverExW
msvcrt
mbtowc
fgetws
fputws
fwrite
oleaut32
LoadRegTypeLi
advapi32
DeleteAce
GetFileSecurityW
gdi32
GetTextExtentPointA
GetOutlineTextMetricsA
GetCharWidthA
ExcludeClipRect
shell32
ExtractIconExA
user32
GetMenuItemInfoA
GetClipboardSequenceNumber
GetClipboardFormatNameA
DrawStateA
IsWindowVisible
GetRawInputDeviceInfoW
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 916KB - Virtual size: 914KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ