?cdfnbb@@YAHH@Z
Static task
static1
Behavioral task
behavioral1
Sample
14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f.dll
Resource
win10v2004-20231023-en
General
-
Target
14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f
-
Size
283KB
-
MD5
3ef876f3f4b774c861c9c7950ea141a5
-
SHA1
428cd7958224cdda95d44ff5d5694eefe2c7f457
-
SHA256
14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f
-
SHA512
980169c7ffaff7e7fea6ad0dce8a9cc93b3d348811fa03ab09caf519b574a8c737ed089c2a44c607f10b8fcd060c52b90af9d84466b14e7f5600d4293da67367
-
SSDEEP
6144:0B7c08bFMMCCvPC4pAOHnaJKGNVAYbZ5:k7c08xMMCUFCNKYV5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f
Files
-
14a1ab7a91918557625652d3da31583ed6ab29a7ff06b84081f115d0944a2e9f.dll windows:6 windows x86
2ae1247b4ac7c9ba06d08ab8f38713cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
IsBadReadPtr
TerminateProcess
InitializeCriticalSectionEx
HeapSize
GetLastError
FileTimeToSystemTime
HeapReAlloc
CloseHandle
RaiseException
DecodePointer
DeleteCriticalSection
GetModuleHandleW
FindClose
GetDriveTypeW
MultiByteToWideChar
WideCharToMultiByte
SetEndOfFile
GetTimeZoneInformation
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetProcessHeap
GetProcAddress
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetFilePointerEx
GetConsoleCP
VirtualFree
SetLastError
HeapFree
VirtualProtect
WriteFile
FlushFileBuffers
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
OutputDebugStringW
RtlUnwind
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetACP
ReadFile
GetConsoleMode
ReadConsoleW
WriteConsoleW
user32
MessageBoxW
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
Exports
Exports
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tvm0 Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ