Static task
static1
Behavioral task
behavioral1
Sample
01650918296e89232a5b7d3ee91716a7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01650918296e89232a5b7d3ee91716a7.dll
Resource
win10v2004-20231215-en
General
-
Target
01650918296e89232a5b7d3ee91716a7
-
Size
180KB
-
MD5
01650918296e89232a5b7d3ee91716a7
-
SHA1
9eb1e82494314129341fb1016b1a1a6e0c53f8e5
-
SHA256
e3c7ef446bad5f2170cd7ae00c411bb6c0b32f720ac19a2af4c83d6083e5080d
-
SHA512
2ecae1e258cb277397da3d46e912eb47390bb5566a5bb2627490f141545cab5f5fa61f245778917b5f80f9479a57810c3b0ca7e7daff00f71f8cc1335142f655
-
SSDEEP
3072:MQfsj4N5n3UbncszziPwT6v2wW1gAmNmCdMlUMmfgHPFsiZMqqDLy/VdJm:5nNpkbcUTkBjXMmfgH2FqqDLu1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01650918296e89232a5b7d3ee91716a7
Files
-
01650918296e89232a5b7d3ee91716a7.dll windows:4 windows x86 arch:x86
f9481cf9e541e4e3b18e664f7975dd3b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetComputerNameW
GlobalAlloc
GetCurrentThreadId
lstrcatW
WaitForMultipleObjects
FreeLibrary
OpenProcess
lstrcmpW
ReleaseMutex
WaitForSingleObject
GetTickCount
Sleep
GlobalFree
GetVersionExW
lstrcpynA
lstrlenA
lstrlenW
GetProcAddress
lstrcpynW
CloseHandle
LocalFree
SetEvent
ResetEvent
HeapDestroy
FindNextChangeNotification
WideCharToMultiByte
CompareStringW
LCMapStringW
GetProcessHeap
MultiByteToWideChar
GetOverlappedResult
SizeofResource
LoadResource
GlobalHandle
VirtualFree
InterlockedDecrement
VirtualAlloc
lstrcpyW
LoadLibraryA
FlushInstructionCache
GetCurrentProcess
GlobalUnlock
ReadFile
SetEndOfFile
SetFileAttributesW
GetDiskFreeSpaceW
SetFilePointer
WriteFile
CreateFileW
DeviceIoControl
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStringTypeW
GetSystemInfo
GetStringTypeA
LCMapStringA
HeapSize
LoadLibraryW
InterlockedExchange
InterlockedCompareExchange
GetUserDefaultUILanguage
LocalAlloc
GetFileAttributesW
GetSystemDefaultUILanguage
GetCommandLineA
InterlockedIncrement
VirtualProtect
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
GetVersionExA
VirtualQuery
ExitProcess
GetModuleHandleA
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapCreate
HeapFree
FreeEnvironmentStringsA
user32
GetParent
CharLowerW
LoadStringW
DestroyWindow
ShowWindow
SetFocus
IsWindow
CharLowerBuffW
advapi32
DeregisterEventSource
ReportEventW
RegisterEventSourceW
OpenProcessToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
DuplicateTokenEx
SetServiceStatus
ole32
CoTaskMemFree
CoTaskMemAlloc
rpcrt4
UuidFromStringW
UuidToStringW
RpcStringFreeW
RpcServerUnregisterIf
RpcServerUseProtseqEpW
RpcServerUseProtseqW
RpcEpRegisterW
RpcBindingVectorFree
RpcServerRegisterIf
RpcServerListen
RpcServerInqBindings
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ