Static task
static1
Behavioral task
behavioral1
Sample
00b58e4f8525161379681c1532f83e7b85f432933d35dc139ec85bb680ddf633.dll
Resource
win10-20231023-en
General
-
Target
00b58e4f8525161379681c1532f83e7b85f432933d35dc139ec85bb680ddf633
-
Size
180KB
-
MD5
3a3fee2e8e1abdd99a020eeb8ee2d271
-
SHA1
4bf22a850b047906f63590f078047e110bbc0445
-
SHA256
00b58e4f8525161379681c1532f83e7b85f432933d35dc139ec85bb680ddf633
-
SHA512
3d069855a785b21267912ec70b866f603ddd6ad9574d8843bde594a5c5fe3913c6e2722823912e3dcc675f3072c41f0d98a5992525437d930553d12f148569b6
-
SSDEEP
3072:TtnUNALmVZvvGBeQYLjpLIAq2tn2TBfki43y97FozS4Oq1sqH73oGN:p4LvkwLjpVqun2TB8i4i0zLOosqHkG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00b58e4f8525161379681c1532f83e7b85f432933d35dc139ec85bb680ddf633
Files
-
00b58e4f8525161379681c1532f83e7b85f432933d35dc139ec85bb680ddf633.dll windows:4 windows x86 arch:x86
1f5e76572fad36553733428ca3571f53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htonl
kernel32
FindClose
FindFirstFileA
GetVolumeInformationA
WaitForSingleObject
CreateMutexA
OpenMutexA
ReadFile
FindNextFileA
FreeLibrary
GetTempPathA
GetSystemDirectoryA
GetSystemTime
lstrlenA
lstrcpynA
GetComputerNameA
OpenProcess
GetVersionExA
GetModuleFileNameA
LocalFree
LocalAlloc
GetCurrentProcess
GetCurrentThread
CreateMutexW
SetLastError
lstrcpyA
GetVersion
lstrcatA
VirtualFree
ReleaseMutex
VirtualAlloc
OpenMutexW
GetModuleHandleA
LoadLibraryExA
IsBadReadPtr
CreateFileW
GetEnvironmentVariableW
LoadLibraryW
MapViewOfFile
CreateFileMappingA
LoadLibraryA
SetFilePointer
GetProcAddress
CreateThread
Sleep
CreateFileA
WriteFile
CloseHandle
GetFileTime
SetFileTime
CreateProcessA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
FindResourceA
LoadResource
SizeofResource
LockResource
DeleteFileA
GetLastError
CopyFileA
SetFileAttributesA
GetEnvironmentVariableA
GetCurrentProcessId
GetFileSize
user32
UnregisterClassA
SetPropA
CreateWindowExW
DestroyWindow
wsprintfA
UnregisterClassW
advapi32
RegDeleteValueA
RegEnumValueA
LookupAccountNameA
RegEnumKeyExA
LookupAccountSidA
IsValidSid
AccessCheck
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
DuplicateTokenEx
OpenThreadToken
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
msvcrt
_mbschr
_local_unwind2
strcmp
wcsncat
wcscpy
strncmp
_wcsicmp
_adjust_fdiv
_itoa
_stricmp
sscanf
strcat
memset
strstr
strncpy
memcpy
strlen
malloc
strcpy
free
strncat
memcmp
_snprintf
_ftol
realloc
_abnormal_termination
wcscmp
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
_initterm
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ