Static task
static1
Behavioral task
behavioral1
Sample
5f890e2f5139eae368ed8d200e85581a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f890e2f5139eae368ed8d200e85581a.dll
Resource
win10v2004-20231215-en
General
-
Target
5f890e2f5139eae368ed8d200e85581a
-
Size
733KB
-
MD5
5f890e2f5139eae368ed8d200e85581a
-
SHA1
5b4df3c63b7f48d768f26b85a57f8b1014b847a8
-
SHA256
448a00e1707cb12181968ac5d1335595ab92f840adb3510ff4f059ac94ae9d42
-
SHA512
ed366cdc24b481e3d94773835c35b19ed38cad8001f76ab6e21f1caa7e58932837b2754c2d5abaa6e2fd75ff95be15150436093be64dde175fb360bf5fa7ba46
-
SSDEEP
12288:dd00PdG44WmJ89rzeoiks02DNR0xDluweZYVypjpMutEP3YBr3CiU0c:300PdGtA/UR0tg0yCUr3C8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f890e2f5139eae368ed8d200e85581a
Files
-
5f890e2f5139eae368ed8d200e85581a.dll windows:6 windows x86 arch:x86
f4b1198f72a2246c9f7fb8f21baf4871
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shell32
ShellExecuteA
user32
CreateWindowExA
DestroyWindow
EnumWindows
FindWindowExW
UnregisterClassA
SetWindowLongW
DefWindowProcA
RegisterClassA
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
CallWindowProcW
MessageBoxA
winmm
timeGetTime
ntdll
VerSetConditionMask
RtlInitUnicodeString
NtDeviceIoControlFile
NtClose
NtCreateFile
RtlUnwind
kernel32
SetEndOfFile
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
WriteConsoleW
GetFileSizeEx
GetConsoleCP
WriteFile
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
DeleteFileW
SetUnhandledExceptionFilter
ExitProcess
ReadFile
GetModuleHandleExW
ExitThread
VirtualFree
VirtualAlloc
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
CloseHandle
HeapAlloc
HeapDestroy
GetThreadContext
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
GetModuleFileNameW
GetFileAttributesExW
FileTimeToSystemTime
DisableThreadLibraryCalls
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoW
Process32NextW
Process32FirstW
SetHandleInformation
SetErrorMode
FreeLibraryAndExitThread
OpenProcess
GetTickCount64
CreateThread
QueryPerformanceFrequency
QueryPerformanceCounter
ReadProcessMemory
VirtualQueryEx
MultiByteToWideChar
GlobalAlloc
GlobalLock
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
LoadLibraryExW
FreeLibrary
InterlockedFlushSList
RaiseException
GetLastError
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
Sections
.text Size: 601KB - Virtual size: 600KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ