Static task
static1
Behavioral task
behavioral1
Sample
07ed8d235579752f87b154c9c4d106e0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07ed8d235579752f87b154c9c4d106e0.dll
Resource
win10v2004-20231215-en
General
-
Target
07ed8d235579752f87b154c9c4d106e0
-
Size
166KB
-
MD5
07ed8d235579752f87b154c9c4d106e0
-
SHA1
a50e6ea27918fda8e05f74733671211938623c50
-
SHA256
cbb2afea444af07b99713a988debc5e9e5ad1979cd18e5552c64dd9c982854e8
-
SHA512
226840e07f87618fd989cb76d5781d336ce94f842159efcebb9561ad5c2f4a0e28a1df4ace7ae648e29c73d1ded75c76856caaf7542ecf1c5a8c4803f27fecc5
-
SSDEEP
3072:+SWs8JrvnD0A9COGVFUoJm4e0WYdqp9ra42BwXt5NKp/a14yvjOmH:tWs8JbDCrFXo9YM24KA2yq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07ed8d235579752f87b154c9c4d106e0
Files
-
07ed8d235579752f87b154c9c4d106e0.dll windows:5 windows x86 arch:x86
991e8900703dce0e41afe179e2eebcbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
LsaNtStatusToWinError
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenCurrentUser
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
setupapi
SetupGetStringFieldW
SetupGetFieldCount
SetupDiSetSelectedDriverW
CM_Get_Device_IDW
SetupDiDeleteDeviceInfo
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
SetupDiOpenDevRegKey
SetupDiSetSelectedDevice
CM_Get_DevNode_Status
shlwapi
PathFindFileNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
lstrlenW
WaitForSingleObject
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetHandleCount
SetFilePointer
SetEvent
SetEnvironmentVariableA
RtlUnwind
RemoveDirectoryW
ReleaseMutex
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateMutexW
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExpandEnvironmentStringsW
FindResourceExW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileAttributesW
GetFileSizeEx
GetFileType
GetGeoInfoW
GetLastError
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessTimes
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserGeoID
GetVersionExW
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
LockResource
MoveFileW
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ole32
CoCreateInstance
shell32
ShellExecuteW
DragQueryFileAorW
WOWShellExecute
oleaut32
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SysAllocStringByteLen
SysAllocString
SafeArrayUnlock
SafeArrayLock
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayCreate
SafeArrayCopy
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringByteLen
SysAllocStringLen
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ