Edge
Static task
static1
Behavioral task
behavioral1
Sample
804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b.dll
Resource
win10v2004-20231023-en
General
-
Target
804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b
-
Size
368KB
-
MD5
be0afe03e192b259779d626eada09676
-
SHA1
f5f0a2f1b5ace1176fca8fde2b3046f189d16436
-
SHA256
804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b
-
SHA512
273c7047daae235b22df52e932facd2e2e7e786e04526b0125661409620aa960fb20b8041c3df05b91d69559c11ab8512d966313d398a08fc43b5ad2e08cd1e9
-
SSDEEP
6144:Vxz8GWQXUyfMyeLWZcfMQxH98XkMVm/Hm9SLykqxW21:VxPNfMzSZckQxdkkMk/Hm9Ser
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b
Files
-
804c7f74b46675dbdc75ee7e2f3bb6ee00ab7551e2f681ca0c03065fd1cf008b.dll windows:4 windows x86
d0b093b52d81603e1ba0c44ac480eaae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSAIoctl
WSACleanup
setsockopt
htons
gethostbyname
socket
recv
select
closesocket
send
inet_addr
connect
WSAStartup
kernel32
TlsFree
SetLastError
SetUnhandledExceptionFilter
HeapSize
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
IsBadWritePtr
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetStringTypeA
GetStringTypeW
SetEndOfFile
TlsAlloc
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalReAlloc
lstrcpynA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
HeapReAlloc
RaiseException
RtlUnwind
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapFree
VirtualProtect
GetProcessHeap
HeapAlloc
GlobalMemoryStatusEx
GetCurrentThreadId
SetThreadExecutionState
GetModuleHandleW
GetProcessId
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetExitCodeProcess
FreeLibrary
GetLastError
ReadFile
GetVersionExA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
LocalAlloc
LocalSize
LocalFree
CopyFileA
MoveFileExA
CreateDirectoryA
OpenProcess
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateMutexA
GetLocalTime
GetFileSize
SetFilePointer
lstrlenA
CreateThread
OutputDebugStringA
DeleteFileA
GetModuleFileNameA
LoadLibraryA
GetTickCount
lstrcatA
CreateFileA
WriteFile
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GetProcAddress
GetCurrentProcess
WinExec
lstrcpyA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
VirtualFree
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadStringA
EnumWindows
SendMessageA
ShowWindow
GetWindowRect
SetWindowPos
GetSystemMetrics
ChangeDisplaySettingsA
FindWindowA
GetClassNameA
GetWindow
GetKeyState
GetAsyncKeyState
wsprintfA
MessageBoxA
GetForegroundWindow
GetWindowTextA
GetLastInputInfo
GetClientRect
CopyRect
GetDlgItem
GetWindowLongA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
OpenProcessToken
DuplicateTokenEx
CloseServiceHandle
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
RegisterServiceCtrlHandlerA
OpenSCManagerA
SetTokenInformation
CreateProcessAsUserA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
StartServiceA
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
SetServiceStatus
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
InternetOpenA
InternetReadFile
FindCloseUrlCache
FindNextUrlCacheEntryA
InternetGetConnectedState
InternetConnectA
FtpSetCurrentDirectoryA
FtpGetFileA
InternetCloseHandle
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
InternetOpenUrlA
Exports
Exports
Sections
.text Size: 152KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 256.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 256.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 256.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ