Edge
Static task
static1
Behavioral task
behavioral1
Sample
500b7565f7affd24ae2332fcd29c9931f3b972f5d82109694eea855dd538766e.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
500b7565f7affd24ae2332fcd29c9931f3b972f5d82109694eea855dd538766e.dll
Resource
win10v2004-20231023-en
General
-
Target
4d2339ce6c18eca6fd0945de4d2ade61.bin
-
Size
39KB
-
MD5
8b3972865487a098bde7976ddfb8f80b
-
SHA1
a39278bffb688114ff9012d38c71c2f283d1c82a
-
SHA256
74ca56690770459ac3ab81962d2cbea171cee2f9fa3309cdecebbe824c0ec2d6
-
SHA512
418c4536bb8427ec4e24cb5eb260650546e40b35001e82d8ee473f74a8e78869fe7b761230c8e3fceada22b5d92037566b65a7749bf20f0f8029f3b7ed73b2c9
-
SSDEEP
768:TXPLYaFFFhviSKTX8jVV1vGC2zTJZHr4KlunLW/7hqlmyWiPWllWkbM/:T/LYarFhvivC9GCcTJNrPlunKhqVWTWp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/500b7565f7affd24ae2332fcd29c9931f3b972f5d82109694eea855dd538766e.dll
Files
-
4d2339ce6c18eca6fd0945de4d2ade61.bin.zip
Password: infected
-
500b7565f7affd24ae2332fcd29c9931f3b972f5d82109694eea855dd538766e.dll.dll windows:5 windows x86
Password: infected
f61b3498a024e1606e5633ff05e57b42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
LocalReAlloc
LocalAlloc
Sleep
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
CreateMutexA
OpenMutexA
SetLastError
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
LocalFree
HeapAlloc
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapSize
HeapFree
CloseHandle
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapReAlloc
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
HeapDestroy
ExitProcess
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
PostQuitMessage
TranslateMessage
DispatchMessageA
KillTimer
SetTimer
GetMessageA
MessageBoxW
GetDesktopWindow
shell32
ShellExecuteExA
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
crypt32
CryptStringToBinaryA
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ