Static task
static1
Behavioral task
behavioral1
Sample
0445c93e99b4bc489074e258737764d7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0445c93e99b4bc489074e258737764d7.dll
Resource
win10v2004-20231222-en
General
-
Target
0445c93e99b4bc489074e258737764d7
-
Size
28KB
-
MD5
0445c93e99b4bc489074e258737764d7
-
SHA1
8f0c3735638ba4298b22cc80cacf982d01faed26
-
SHA256
cf2edea0a5541457594f5962037d51df09361d04cb158214e959ffce28eb03c9
-
SHA512
4f6c76642de1835a585d94079c10bf23ab895d542f6d0ebcfdd30d0a8e934bdd27f4543b9aca200e9a590b728401931ae0c6cc7acc9168333e99613ada6dcf86
-
SSDEEP
192:sufqiJvuH05BED4+nzAIJonG4KzJQh/Up+1msKhDAVlDRpj3pTVH:riiJmH0B/TIJG5JVpjZTVH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0445c93e99b4bc489074e258737764d7
Files
-
0445c93e99b4bc489074e258737764d7.dll windows:4 windows x86 arch:x86
ed23ea80c2295fd2dad249dccac4d476
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
CoInitialize
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
kernel32
CopyFileA
WinExec
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
CloseHandle
GetTempPathA
DeleteFileA
lstrcatA
GetSystemDirectoryA
CreateThread
GetModuleFileNameA
CreateMutexA
GlobalAddAtomA
OpenMutexA
GlobalFindAtomA
GetModuleHandleA
GetCurrentThread
GetCurrentProcess
Sleep
urlmon
URLDownloadToFileA
msvcp60
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
msvcrt
strcmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
??2@YAPAXI@Z
sprintf
memcpy
free
strchr
strcpy
atoi
fclose
fopen
memset
strrchr
strlen
__CxxFrameHandler
_stricmp
ftell
fseek
fread
strcat
malloc
fwrite
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 914B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ