GetPlugin
Static task
static1
Behavioral task
behavioral1
Sample
62d76afcc306a3e04238d86910c834cf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62d76afcc306a3e04238d86910c834cf.dll
Resource
win10v2004-20231222-en
General
-
Target
62d76afcc306a3e04238d86910c834cf
-
Size
440KB
-
MD5
62d76afcc306a3e04238d86910c834cf
-
SHA1
6bfab2ba9a29069aff148072454cd397c76072c1
-
SHA256
78284584695d0dbb46c8506ecda9b22a63f156e8f5f17fefd357600b91ec8369
-
SHA512
e63d2a2acd796ad0c0d7c6c079d457269eea8fd12079cf569ad265236a2c188c4c29787581666fd0c531a26c7ebd6ad55037bac89ff3297352ad6505a898eda4
-
SSDEEP
6144:vrDiPxW2Xa9Y19NMrhKg6qUmYxtJLLAKMfVW5Wt3AkHsq/D0:vrDOWyNMNKFqcRMfnt3Js
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62d76afcc306a3e04238d86910c834cf
Files
-
62d76afcc306a3e04238d86910c834cf.dll windows:4 windows x86 arch:x86
667809716e7a1c8f12ca0372a73944d9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
WriteConsoleW
GetFileType
GetStdHandle
ExitProcess
HeapSize
Sleep
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LoadLibraryW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
LCMapStringA
LCMapStringW
GetLocaleInfoW
CreateFileA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FormatMessageA
LocalFree
MulDiv
CloseHandle
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
FreeLibrary
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
SetLastError
GetModuleHandleA
GetProcAddress
GetModuleFileNameW
GetModuleFileNameA
CreateFileW
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
GetVersion
GetLastError
lstrlenA
CompareStringA
SetHandleCount
GetLocalTime
user32
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowTextA
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
MessageBoxA
DestroyMenu
GetDlgItem
CheckDlgButton
GetWindow
UnhookWindowsHookEx
PostMessageA
SendMessageA
EnableWindow
GetWindowRect
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
PostQuitMessage
SetCursor
ReleaseDC
GetSysColor
GetDC
SetPropA
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
SetWindowExtEx
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHFileOperationA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
Sections
.text Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ