mymain
Static task
static1
Behavioral task
behavioral1
Sample
911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d.dll
Resource
win10v2004-20231020-en
General
-
Target
911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d
-
Size
1.4MB
-
MD5
9ac2dc5015566254d3cc847ec9a6d167
-
SHA1
d32ea4349e0bcc70efc35896a8366949eb32b258
-
SHA256
911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d
-
SHA512
bcfe50ffc12fd591e24a55b5735aecd7603827185b5003542385ca976fd303382bdfd31d29edfff024c3b0222ad845aaf872a557ce8cc21486275d9004c8bdbc
-
SSDEEP
24576:xv3t2JVGON3WD1X8ac3x9MyowtooVSWYFR3TlIpV90X6IQ:xv4q1X8ac3xlowJcR3Tu+s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d
Files
-
911f574331d3bcb49c794d51d1c1758d69a0e78b7d39e8c3698eac39ed62304d.dll windows:4 windows x86
15c5e30610a0a78323845aca2f5b7327
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Process32First
Process32Next
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
WriteFile
CreateFileA
GetTickCount
GetModuleFileNameA
GetPrivateProfileStringA
ReadFile
GetFileSize
SetFilePointer
GetEnvironmentVariableA
FindClose
FindFirstFileA
FindNextFileA
CreateProcessA
GetStartupInfoA
GetCommandLineA
FreeLibrary
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
Module32Next
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
RaiseException
Module32First
CreateToolhelp32Snapshot
lstrcpyn
GetProcAddress
LoadLibraryA
GetModuleHandleA
ResumeThread
GetCurrentProcessId
WaitForSingleObject
VirtualProtectEx
SetWaitableTimer
CreateWaitableTimerA
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentStringsW
GetEnvironmentStrings
TerminateProcess
OpenProcess
CreateThread
DeleteCriticalSection
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
MsgWaitForMultipleObjects
SetTimer
EnumChildWindows
TranslateMessage
DispatchMessageA
EnumWindows
GetWindow
GetWindowRect
MessageBoxA
wsprintfA
PeekMessageA
GetMessageA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
advapi32
RegSetValueExA
CryptCreateHash
CryptReleaseContext
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptAcquireContextA
ws2_32
WSAStartup
inet_ntoa
WSACleanup
gethostbyname
shlwapi
PathFileExistsA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Exports
Exports
Sections
.text Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ