Static task
static1
Behavioral task
behavioral1
Sample
bb38811767f42635a13b56afd5bbace7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb38811767f42635a13b56afd5bbace7.dll
Resource
win10v2004-20231215-en
General
-
Target
bb38811767f42635a13b56afd5bbace7
-
Size
152KB
-
MD5
bb38811767f42635a13b56afd5bbace7
-
SHA1
291f9b8b1075f0b97c7bdeb1e27a4358a5d08e96
-
SHA256
93d1df69e244cae0eeec8a6422e70fa404a5227907e93cdb06eec97c5f4f155a
-
SHA512
5ae6111bdaa1741ff318e8fe44f89125d610f902b46660a8c02c76132d8c9fd8b4d48503d1dfb86476e0a1347d3d6b39446d86f7ab5d30c9d7d083dd3943aebb
-
SSDEEP
3072:3hSOaj9fCvequz+4dHZtRMRmjLygGyH21qFo9eN:xJqR+4VZt2RmnyBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb38811767f42635a13b56afd5bbace7
Files
-
bb38811767f42635a13b56afd5bbace7.dll windows:4 windows x86 arch:x86
6614a160b0407dbe994985cf6b1a8e29
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
IsBadReadPtr
FlushInstructionCache
GetCurrentThread
VirtualProtect
FreeLibrary
SetThreadPriority
GetCurrentThreadId
GetProcessVersion
CloseHandle
WaitForSingleObject
GetFileSize
FindFirstFileA
GetModuleFileNameA
GetThreadPriority
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSection
GetLastError
GetExitCodeProcess
OpenProcess
ResetEvent
SetEvent
WaitForMultipleObjects
CreateEventA
HeapFree
GetProcessHeap
CreateThread
HeapAlloc
FindClose
FindNextFileA
MultiByteToWideChar
GetModuleHandleA
GetFileTime
CreateFileA
HeapReAlloc
HeapValidate
IsBadWritePtr
lstrlenW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
VirtualAlloc
LoadLibraryA
GetProcAddress
lstrlenA
GetCurrentProcess
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetStdHandle
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
Sleep
FlushFileBuffers
RaiseException
InterlockedDecrement
InterlockedIncrement
MoveFileA
GetCommandLineA
GetVersion
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
WideCharToMultiByte
ExitProcess
user32
SetActiveWindow
GetCursor
GetForegroundWindow
GetKeyboardLayout
MapVirtualKeyExA
DispatchMessageA
TranslateMessage
SetLastErrorEx
SetWindowLongA
SetRectEmpty
SetCursorPos
IsRectEmpty
SetThreadDesktop
GetWindowDC
GetIconInfo
GetMessageA
SetForegroundWindow
SetTimer
FindWindowA
GetWindowRect
SetRect
GetDC
ScreenToClient
GetWindowThreadProcessId
SetParent
GetClientRect
gdi32
SetRectRgn
advapi32
RevertToSelf
oleaut32
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SYNC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ