Static task
static1
Behavioral task
behavioral1
Sample
461c3c824c39a48f4e3c8df43bfa7430.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
461c3c824c39a48f4e3c8df43bfa7430.dll
Resource
win10v2004-20231215-en
General
-
Target
461c3c824c39a48f4e3c8df43bfa7430
-
Size
823KB
-
MD5
461c3c824c39a48f4e3c8df43bfa7430
-
SHA1
6f3469cb796c49b8f53d98e3c8a8d05260e220a6
-
SHA256
39b36f0ca57ff5236e807b59fd0a5e75eda21a671ec1c9174e5401c48d421880
-
SHA512
c2ebea6bdbb94d006c29a94164af0b3378e50e5e143283d0f03f29bc3d33e5a6711ad52456ab5164b25e168d65ca186e18dc0b29ed078750d2d6b52c56c9c725
-
SSDEEP
12288:CcujNeMQtCb0J8bhoPomrJhetlFi6BE1uauZMI5TON5DgT0CnFGxl67PG:CPZQtCb0J8StIi6BOumI5ZT/nFGxloe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 461c3c824c39a48f4e3c8df43bfa7430
Files
-
461c3c824c39a48f4e3c8df43bfa7430.dll windows:5 windows x86 arch:x86
d29dd3101b92b42af78e49aa93f2e413
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GlobalAlloc
HeapAlloc
RtlUnwind
user32
PostQuitMessage
SystemParametersInfoA
PeekMessageA
EndDialog
GetClientRect
CheckDlgButton
DialogBoxParamA
GetDC
CharPrevA
SetCursor
CreateWindowExA
SetWindowTextA
CloseClipboard
EndPaint
DrawTextA
DispatchMessageA
CallWindowProcA
GetDlgItem
SetWindowPos
LoadBitmapA
GetDlgItemTextA
BeginPaint
SetWindowLongA
SetForegroundWindow
DefWindowProcA
LoadImageA
InvalidateRect
GetMessagePos
GetWindowRect
EnableWindow
CharNextA
AppendMenuA
SetDlgItemTextA
IsWindow
SetClassLongA
ShowWindow
GetSysColor
SendMessageA
EmptyClipboard
EnableMenuItem
MessageBoxIndirectA
SetTimer
CreateDialogParamA
GetClassInfoA
GetSystemMetrics
CreatePopupMenu
wsprintfA
TrackPopupMenu
SendMessageTimeoutA
OpenClipboard
IsWindowEnabled
DestroyWindow
GetSystemMenu
LoadCursorA
FillRect
RegisterClassA
IsWindowVisible
FindWindowExA
GetWindowLongA
ScreenToClient
ExitWindowsEx
SetClipboardData
gdi32
SetTextColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
SelectObject
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegEnumKeyA
RegCreateKeyExA
RegDeleteKeyA
RegEnumValueA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetFileInfoA
SHFileOperationA
SHGetPathFromIDListA
ole32
OleInitialize
CoTaskMemFree
OleUninitialize
CoCreateInstance
comctl32
ord17
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
secur32
QuerySecurityPackageInfoA
wldap32
ord95
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xyue Size: 743KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 807KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ