Static task
static1
Behavioral task
behavioral1
Sample
062cc503040a7974596a7e4f491a0721.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
062cc503040a7974596a7e4f491a0721.dll
Resource
win10v2004-20231215-en
General
-
Target
062cc503040a7974596a7e4f491a0721
-
Size
3.7MB
-
MD5
062cc503040a7974596a7e4f491a0721
-
SHA1
978a9cc19f95ae2a0fc706f1473fb1764751f857
-
SHA256
a5f39ec3202abcd54e09931a21ed764c286cfff5569d7dd48fe34df053208262
-
SHA512
696d6c5a34fbafdc0a391777a0830ee2608b890f613419a67e87a0e9436ec06e6e10f09c419af9d341dfc73ee4ff78583ad25d81ae7d7efd48c944f4186d64b8
-
SSDEEP
98304:Le6RWNQ5ZolIqgcBlxsCglfXyed4/QYNHsUG7AtUEQLh97/aOpulouw4XZGDn6q4:Le6AaLGxsLieEN7sbpulouV5IlV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 062cc503040a7974596a7e4f491a0721
Files
-
062cc503040a7974596a7e4f491a0721.dll windows:5 windows x86 arch:x86
f1f1f6a1c69b67a88f38b1e5b116cee7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSAStartup
WSACleanup
WSASetLastError
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
__WSAFDIsSet
WSAGetLastError
select
recv
send
getsockname
setsockopt
WSAIoctl
winmm
PlaySoundA
wldap32
ord32
ord46
ord41
ord27
ord301
ord33
ord200
ord79
ord35
ord60
ord30
ord26
ord50
ord143
ord211
ord22
kernel32
GlobalUnlock
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
CreateThread
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetModuleHandleA
GetProcAddress
Sleep
TerminateThread
OpenFileMappingA
MapViewOfFile
GetTickCount
OutputDebugStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
LoadLibraryA
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
ExitProcess
VirtualQueryEx
GetCurrentProcess
GetModuleFileNameA
VirtualFree
GetCurrentThreadId
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetLastError
CopyFileA
WriteFile
GetFileSize
ReadFile
SetFilePointer
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
SleepEx
VerifyVersionInfoA
VerSetConditionMask
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
ExpandEnvironmentStringsA
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStartupInfoW
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetLocaleInfoW
HeapDestroy
HeapCreate
GetModuleFileNameW
GetModuleHandleW
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RaiseException
FindFirstFileExA
GetDriveTypeA
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
HeapAlloc
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
MulDiv
CreateFileA
GlobalLock
GlobalAlloc
VirtualProtect
VirtualQuery
FlushFileBuffers
GetFullPathNameA
GetCurrentDirectoryW
GetUserDefaultLCID
GetLocaleInfoA
GetExitCodeProcess
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
WriteConsoleW
LoadLibraryW
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
SetEndOfFile
GetProcessHeap
CreateFileW
LoadLibraryExA
CreateProcessA
DuplicateHandle
MoveFileA
DeleteFileA
GetTimeFormatA
GetDateFormatA
CreatePipe
FreeLibrary
GetCurrentDirectoryA
GetACP
FindResourceA
LoadResource
FreeResource
SizeofResource
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
LockResource
user32
InvalidateRgn
CreateAcceleratorTableA
IntersectRect
VkKeyScanA
KillTimer
GetParent
IsWindowVisible
PostQuitMessage
SetWindowRgn
GetWindowRect
ScreenToClient
IsIconic
MonitorFromWindow
GetMonitorInfoA
FillRect
CallWindowProcA
GetWindowThreadProcessId
CharLowerA
SetWindowLongA
GetWindowLongA
SetClipboardData
CloseClipboard
EmptyClipboard
OpenClipboard
CallNextHookEx
SetWindowsHookExA
MessageBoxA
GetClientRect
GetWindowTextA
TranslateMessage
GetClassNameA
EnumWindows
GetForegroundWindow
GetActiveWindow
WindowFromPoint
GetWindow
SendMessageA
GetKeyState
SetTimer
IsWindow
wsprintfA
SendInput
SetCursorPos
ClientToScreen
keybd_event
PostMessageA
MapVirtualKeyA
ReleaseDC
GetDC
DrawTextA
ReleaseCapture
SetCapture
GetFocus
MoveWindow
GetUpdateRect
BeginPaint
EndPaint
DestroyWindow
IsRectEmpty
MapWindowPoints
GetCursorPos
GetWindowTextLengthA
InvalidateRect
SetWindowTextA
SetPropA
GetPropA
PtInRect
GetClassInfoExA
SetCursor
LoadCursorA
OffsetRect
CharNextA
wvsprintfA
DefWindowProcA
CreateWindowExA
ShowWindow
SetFocus
EnableWindow
SetWindowPos
SystemParametersInfoA
RegisterClassA
RegisterClassExA
gdi32
MoveToEx
LineTo
RoundRect
ExtTextOutA
SetStretchBltMode
StretchBlt
GetClipBox
ExtSelectClipRgn
SelectClipRgn
GetTextMetricsA
SaveDC
RestoreDC
SetWindowOrgEx
CreateFontIndirectA
CreateDIBSection
SetBkColor
TextOutA
SetBkMode
SetTextColor
Rectangle
CreatePen
SetPixel
CombineRgn
CreateRoundRectRgn
CreateRectRgnIndirect
CreateSolidBrush
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
DeleteObject
advapi32
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptAcquireContextA
CryptCreateHash
shell32
DragFinish
DragQueryFileA
ntdll
RtlUnwind
NtQueryInformationThread
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
comctl32
ord17
_TrackMouseEvent
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 287KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ