Static task
static1
Behavioral task
behavioral1
Sample
f45a18ae5714d1aeb067f1b4f4923073.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f45a18ae5714d1aeb067f1b4f4923073.dll
Resource
win10v2004-20231023-en
General
-
Target
f45a18ae5714d1aeb067f1b4f4923073.bin
-
Size
364KB
-
MD5
f45a18ae5714d1aeb067f1b4f4923073
-
SHA1
e6f53d26e2734bbcb91ec828883465db3d40666d
-
SHA256
e0f7bff1502dfca58121b84627d51ff2622857fd247123b4160833a5806b2bf2
-
SHA512
bad89a98965bb21239fd644c4a0d3de4a09e51e0e4f8b24d2e158621d07730e395e287d91317b374e4443bef0ad4c919140bf36fc165b5e59a4b72a674c812f9
-
SSDEEP
6144:5HTs5cIzrLrLrLgsVJIS+Nn49MS0BqQOrCV50DErFNg/ydlb4fQ6wFMv53:uYha0QdDENg6dNoQl+vB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f45a18ae5714d1aeb067f1b4f4923073.bin
Files
-
f45a18ae5714d1aeb067f1b4f4923073.bin.dll windows:6 windows x86
2777597dd42231ae864f117e6eb75a77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
MessageBoxA
GetForegroundWindow
wsprintfA
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
AdjustWindowRect
MessageBoxW
CloseWindow
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
GetMessageA
TranslateMessage
DispatchMessageA
EnumChildWindows
ReleaseDC
DestroyWindow
DeferWindowPos
wsprintfW
AnimateWindow
gdi32
SetPixel
DeleteObject
SetPaletteEntries
SelectPalette
GetDeviceCaps
kernel32
CreateFileW
lstrcpyA
GetLastError
lstrcatA
GetProcAddress
lstrlenW
CreateDirectoryW
TlsSetValue
lstrcpynW
lstrcatW
FindNextFileW
lstrcmpW
FindClose
GetTickCount
VirtualFree
ExitThread
CreateThread
CloseHandle
WaitForSingleObject
LocalAlloc
HeapAlloc
VirtualAlloc
TlsGetValue
LoadLibraryA
ExitProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WriteFile
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
GetModuleHandleA
Sleep
lstrlenA
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
AllocConsole
GetStdHandle
WriteConsoleW
UnmapViewOfFile
lstrcmpiW
lstrcpyW
SetFileAttributesW
MoveFileExW
FindFirstFileW
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
GetCommandLineW
CreateMutexW
GetFileSizeEx
IsProcessorFeaturePresent
ReadFile
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetVersionExA
ExpandEnvironmentStringsW
OutputDebugStringW
SetFilePointerEx
advapi32
LsaCreateTrustedDomainEx
EncryptionDisable
LsaAddAccountRights
AreAllAccessesGranted
EqualDomainSid
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
LsaClose
CryptGenRandom
CryptReleaseContext
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextW
LookupAccountSidW
LsaQueryTrustedDomainInfo
LsaFreeMemory
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
shlwapi
StrStrW
StrToIntA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
ws2_32
shutdown
closesocket
connect
htons
inet_addr
WSAGetLastError
WSACleanup
socket
WSAStartup
inet_pton
send
gethostbyname
inet_ntoa
recv
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringW
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
Sections
.text Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ