?JoeBiden@@YGKPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e.dll
Resource
win10v2004-20231020-en
General
-
Target
d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e
-
Size
117KB
-
MD5
df9b0d542872062ab039749a76486498
-
SHA1
3a69fa3402f08ed51953e115d16c4eb5ad14de5a
-
SHA256
d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e
-
SHA512
f46bc5d4423c6332d85e1f446139ce28816f47f28e0e60b7c65a8bb44aedbab9b56e081aa340b70787c170bee25d96f181798758c3eaac7c5daa105c187bdf18
-
SSDEEP
3072:5XoAmTRRNtz7hWPpnSDeKqVbmK3ffE+iu:ZoA2XNtz7FqBkzu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e
Files
-
d4c60bb37ce21f5b32e384e3a2e7abaeedca23878440e9f79716bedccca5423e.dll windows:6 windows x86 arch:x86
ad45757120120297575538792bd0a069
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc140
ord8347
ord8429
ord2210
ord2241
ord14054
ord5406
ord5858
ord10963
ord1526
ord5861
ord3005
ord305
ord5898
ord9320
ord5398
ord9332
ord4468
ord14512
ord501
ord1141
ord4085
ord6290
ord973
ord10383
ord11917
ord12372
ord2894
ord14514
ord498
ord1140
ord14520
ord4789
ord2880
ord1696
ord6996
ord2986
ord12194
ord12162
ord12869
ord5742
ord10202
ord9166
ord6831
ord7961
ord1050
ord324
ord1468
ord993
ord7618
ord12074
ord11343
ord4084
ord3396
ord3395
ord6193
ord13677
ord3298
ord3295
ord8173
ord2758
ord14699
ord10237
ord10239
ord10238
ord10236
ord10240
ord5631
ord11671
ord11672
ord9096
ord12032
ord3830
ord11881
ord14502
ord8922
ord12116
ord6947
ord10950
ord9192
ord12485
ord13798
ord12205
ord12201
ord1717
ord12806
ord1765
ord1751
ord1772
ord4920
ord4987
ord4932
ord4950
ord4944
ord4938
ord4997
ord4981
ord4926
ord5003
ord4958
ord4896
ord4911
ord4972
ord4493
ord9647
ord4485
ord3050
ord14510
ord7887
ord14508
ord6848
ord11663
ord13628
ord5911
ord2680
ord12067
ord3933
ord3364
ord3363
ord3258
ord12111
ord5228
ord5528
ord5739
ord9305
ord5504
ord5769
ord5231
ord5390
ord5210
ord7687
ord7688
ord7677
ord5388
ord8182
ord10207
ord9167
ord8776
ord13407
ord14048
ord3159
ord5401
ord10421
ord8997
ord3825
ord8713
ord14149
ord7461
ord1111
ord6463
ord6540
ord3874
ord316
ord1044
ord4807
ord2298
ord1109
ord462
ord7078
ord14509
ord7886
ord8285
ord14507
ord5336
ord9353
ord4143
ord4082
ord12888
ord7905
ord2027
ord2484
ord11927
ord1739
ord11928
ord14380
ord12474
ord7964
ord14581
ord6322
ord14583
ord6324
ord14582
ord6323
ord3844
ord5894
ord12182
ord12190
ord12484
ord4580
ord3259
ord8180
ord3841
ord1510
ord325
ord1051
ord2359
ord2406
ord2409
ord2372
ord2408
ord485
ord2263
ord2370
ord2178
ord2294
ord2397
ord1507
ord1446
ord1509
kernel32
OutputDebugStringW
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
GetTickCount
GetPrivateProfileStringA
CreateThread
OpenFileMappingA
MapViewOfFile
CloseHandle
GetModuleHandleA
GetCurrentThreadId
WritePrivateProfileStringA
VirtualProtectEx
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
LocalAlloc
LocalFree
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcessId
GetProcAddress
user32
TranslateMessage
DispatchMessageA
LoadIconW
IsWindowVisible
CallNextHookEx
GetMessageA
GetWindowThreadProcessId
SetWindowsHookExA
SetWindowTextA
SetTimer
KillTimer
InvalidateRect
EnableWindow
SendMessageA
GetWindowRect
MessageBoxA
gdi32
CreateSolidBrush
msvcp140
?_Xinvalid_argument@std@@YAXPBD@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Xout_of_range@std@@YAXPBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
__CxxFrameHandler3
__std_exception_destroy
__std_exception_copy
__std_terminate
memset
_except_handler4_common
__std_type_info_destroy_list
memmove
memcpy
memchr
_CxxThrowException
api-ms-win-crt-convert-l1-1-0
strtol
atoi
strtof
api-ms-win-crt-string-l1-1-0
isalnum
strncpy_s
toupper
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_configure_narrow_argv
_seh_filter_dll
_cexit
_initterm
_invalid_parameter_noinfo
_invalid_parameter_noinfo_noreturn
_initterm_e
_errno
_initialize_narrow_environment
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
Exports
Exports
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 595KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ