vtdfqlrhy
Static task
static1
Behavioral task
behavioral1
Sample
631acb693de0344de2334c5d96b5d917.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
631acb693de0344de2334c5d96b5d917.dll
Resource
win10v2004-20231215-en
General
-
Target
631acb693de0344de2334c5d96b5d917
-
Size
88KB
-
MD5
631acb693de0344de2334c5d96b5d917
-
SHA1
d9d3615300dc2cfdaab71a81793c18dcbb7d5fe4
-
SHA256
c1ca23ecdf57dcb0213cc7e581e9d6295fcc3849a6136b7bc509d9183d91576c
-
SHA512
24b03d84f515329dfc67ec3fa4e2b7bdf251ad1c523b2c48f5f03bfb629aac7390682159d58a9f4aeca43482f59cb2c884f6f075ee1e11da96af043fc6ef7ae6
-
SSDEEP
1536:9mNjI+BeN4xfnNq4Xq36d5s8LeYMYcDycyRa7+VwWKApBCJ:6IgeN4xfNqGq3d8C+cyiWCJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 631acb693de0344de2334c5d96b5d917
Files
-
631acb693de0344de2334c5d96b5d917.dll windows:4 windows x86 arch:x86
e6e00f4c0d58cc356384192ab7a38e0a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetStringTypeA
lstrlenW
LCMapStringA
CreateFileA
UnmapViewOfFile
WaitForSingleObject
LocalFree
IsDBCSLeadByte
DeleteFileA
VirtualProtect
CreateMutexA
VirtualAlloc
GetStringTypeW
MultiByteToWideChar
HeapDestroy
SetFileTime
TlsAlloc
WriteFile
CreateFileW
SetHandleCount
CreateFileMappingW
MapViewOfFile
FreeEnvironmentStringsW
DisableThreadLibraryCalls
GetTickCount
GetStartupInfoA
GetSystemTimeAsFileTime
Sleep
OpenFileMappingA
VirtualFree
InitializeCriticalSectionAndSpinCount
GetFileSize
CloseHandle
HeapCreate
GetFullPathNameW
TerminateProcess
GetACP
GetStringTypeExA
QueryPerformanceCounter
DeleteFileW
lstrcmpA
InterlockedDecrement
HeapFree
FlushViewOfFile
WideCharToMultiByte
CreateMutexW
MoveFileA
GetEnvironmentVariableA
VirtualQuery
UnhandledExceptionFilter
HeapReAlloc
GetCurrentProcess
GetDiskFreeSpaceW
GetVersionExA
GetLastError
GetStdHandle
InitializeCriticalSection
InterlockedIncrement
GetFullPathNameA
OpenFileMappingW
TlsFree
GetCPInfo
GetSystemInfo
TlsGetValue
GetCurrentProcessId
ReleaseMutex
GetCurrentThreadId
GetProcAddress
FreeEnvironmentStringsA
GetLocaleInfoA
MoveFileW
IsBadReadPtr
SetFilePointer
GetEnvironmentStrings
LeaveCriticalSection
GetOEMCP
HeapAlloc
lstrlenA
CreateFileMappingA
GetFileType
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetDiskFreeSpaceA
InterlockedExchange
DeleteCriticalSection
lstrcmpiA
CreateThread
EnterCriticalSection
CompareFileTime
SetEvent
SetEndOfFile
LocalAlloc
FreeLibrary
LoadLibraryA
CreateEventA
SetLastError
MoveFileWithProgressA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ