wdrwgpv
Static task
static1
Behavioral task
behavioral1
Sample
18eeccb81f43509d0ed8e8520dfdd5c3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18eeccb81f43509d0ed8e8520dfdd5c3.dll
Resource
win10v2004-20231222-en
General
-
Target
18eeccb81f43509d0ed8e8520dfdd5c3
-
Size
88KB
-
MD5
18eeccb81f43509d0ed8e8520dfdd5c3
-
SHA1
33558636c481b8243a495f6d9f1afe2fe1a538a8
-
SHA256
32aabdba3b61825a2ae9f2bd40c41eb3b1a13698c11e04fdaaaa1b528030b95e
-
SHA512
f1a216facb63f505a9290aaecca51ee48b27ecb5a32e1c0c254b8646359196826e52d0487d3656eceefa845f4f9febb8f46580a48b6fd31c3cbc2191f1276cbc
-
SSDEEP
1536:0hOub0TOvJx/Ro9bGyTdTZdJvjWyWxXoEQLSw/q5:0O0JxcbG2dTZdJCPYEQM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18eeccb81f43509d0ed8e8520dfdd5c3
Files
-
18eeccb81f43509d0ed8e8520dfdd5c3.dll windows:4 windows x86 arch:x86
a9547091a06a6a6ef52bf7ac2b9fd79a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFullPathNameW
SetEndOfFile
GetDiskFreeSpaceExW
GetLogicalDriveStringsW
GetCurrentProcess
DeleteFileW
GetSystemInfo
GetVersionExW
SetFilePointerEx
GetModuleHandleW
GetCurrentThread
GetDriveTypeW
FormatMessageW
GetProcAddress
CreateHardLinkW
GetModuleHandleA
GetVolumeInformationW
GetTimeFormatW
LocalFree
GetFileSizeEx
GetDateFormatW
CloseHandle
GetLastError
CreateFileW
DeviceIoControl
advapi32
LookupAccountSidA
OpenEventLogW
LookupAccountSidW
RevertToSelf
LookupAccountNameW
AdjustTokenPrivileges
AllocateAndInitializeSid
LookupPrivilegeValueW
CheckTokenMembership
CloseEventLog
OpenProcessToken
OpenThreadToken
ImpersonateSelf
ReadEventLogW
EqualSid
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 538B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ