Static task
static1
Behavioral task
behavioral1
Sample
c5a73896dc628c23a0b6210f50019445e2b8bfc9770f4c81e1fed097f02dfade.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c5a73896dc628c23a0b6210f50019445e2b8bfc9770f4c81e1fed097f02dfade.dll
Resource
win10v2004-20231023-en
General
-
Target
5351e89dbd7f44f50a29cbd176030b19.bin
-
Size
56KB
-
MD5
85661d40ff0839ed15a027b63c0c9a8c
-
SHA1
7d436a6bd0188474fa22fb68aa0f2d0faebc7248
-
SHA256
5300c87994b6b7fb0ab57f415f4474bd2c051558522756e778abbe8c0565ea32
-
SHA512
3d7f674e3ebf15ab2001fc91f2b9eedda1b13588070ae36f113ddbb106148a0b919b16d375e8bc593e52e7b6e190b991951ca5c88b637afcd19810baba2f1558
-
SSDEEP
768:UHBNUjZbGfWXG/dzIOZTpcYxXDYVm69v1L9h77s6rArEp3XZ4k25VCjR:bvX0ZTKY8lv5nHArEZZbgEjR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c5a73896dc628c23a0b6210f50019445e2b8bfc9770f4c81e1fed097f02dfade.exe
Files
-
5351e89dbd7f44f50a29cbd176030b19.bin.zip
Password: infected
-
c5a73896dc628c23a0b6210f50019445e2b8bfc9770f4c81e1fed097f02dfade.exe.dll windows:6 windows x64 arch:x64
Password: infected
0ff8b58515b3fa045e6bff9a9e0cca16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
VirtualQuery
LocalFree
GetModuleHandleA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
WriteConsoleW
GetSystemInfo
VirtualProtect
LoadLibraryExA
crypt32
CryptProtectData
CryptUnprotectData
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ