Run
Static task
static1
Behavioral task
behavioral1
Sample
a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3.dll
Resource
win10v2004-20231020-en
General
-
Target
a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3
-
Size
2.0MB
-
MD5
dac0ea895b8048da299d083952e8ed90
-
SHA1
4de104c15fe52fe1b8fe06525f090583b4e7c25b
-
SHA256
a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3
-
SHA512
99b0a77352ce3eb509adeccdcc4a387e4893aee30dbbd42cbee15f7ed3bf3022c1ff79a0a04edc7a26e29155ebeae78a5829ab2875bf9245cf9b5c093e628ff8
-
SSDEEP
49152:SpW2WCN9mIFOKjQ5Tw2onUr1q7NWcPjH3hCbC5GMhE:SpW2WCDmIFOh5Twkq7NWsXh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3
Files
-
a6b64f6c0d2cdf795cce4b11cf54d806e8d4a7c7a2cc4b27ba0c9c143fbd9ca3.dll windows:5 windows x86 arch:x86
de031a67848cf10094e94362c4a2fbab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetVersionExW
GlobalAlloc
GlobalFree
OpenProcess
GetExitCodeProcess
GetLastError
LoadLibraryW
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileSize
WriteFile
ReadFile
FindClose
lstrcpyW
GetTempPathW
CreateFileW
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileExW
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
GetModuleFileNameW
GetVolumeInformationW
GetLongPathNameW
FileTimeToSystemTime
DeviceIoControl
OutputDebugStringA
SetPriorityClass
GetTempFileNameW
RtlUnwind
EncodePointer
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleW
GetModuleFileNameA
GetACP
GetStdHandle
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
OutputDebugStringW
GetTickCount
CreateEventW
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetPrivateProfileIntW
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateThread
CloseHandle
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
GetFullPathNameW
GetCurrentDirectoryW
SetConsoleMode
ReadConsoleInputA
GetModuleHandleExW
VirtualProtect
VirtualFree
VirtualAlloc
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetSystemDirectoryW
GetPrivateProfileStringW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
GlobalMemoryStatus
FlushConsoleInputBuffer
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
SleepEx
GetFileAttributesExA
QueryPerformanceFrequency
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
user32
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
LoadStringW
wsprintfW
advapi32
SetSecurityDescriptorDacl
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegQueryValueExW
ImpersonateLoggedOnUser
RevertToSelf
RegOpenKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
CryptDestroyKey
InitializeSecurityDescriptor
SetTokenInformation
OpenProcessToken
DeregisterEventSource
RegisterEventSourceA
ReportEventA
CryptDestroyHash
CryptAcquireContextA
CryptReleaseContext
CryptEnumProvidersA
CryptSignHashA
iphlpapi
GetAdaptersInfo
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
ws2_32
WSAGetLastError
getservbyname
socket
__WSAFDIsSet
select
WSASetLastError
recv
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
WSACleanup
getaddrinfo
freeaddrinfo
accept
listen
send
gethostbyname
gethostname
ioctlsocket
htonl
shutdown
sendto
WSAStartup
recvfrom
wldap32
ord60
ord211
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord143
ord301
ord46
ord217
ord50
wininet
InternetCloseHandle
HttpQueryInfoW
InternetOpenUrlW
InternetQueryOptionW
InternetOpenW
InternetReadFile
InternetSetOptionW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Exports
Exports
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 382KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ