Static task
static1
Behavioral task
behavioral1
Sample
618fc3fbc54d3bb21fb86cf8301feb3c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
618fc3fbc54d3bb21fb86cf8301feb3c.dll
Resource
win10v2004-20231215-en
General
-
Target
618fc3fbc54d3bb21fb86cf8301feb3c
-
Size
38KB
-
MD5
618fc3fbc54d3bb21fb86cf8301feb3c
-
SHA1
55bddf50ae35a0bb298e14a5971545d36f421e03
-
SHA256
41c43cea39c1347dd23e401d52c4f46316c7e9d0a6c66d1cd2606fc9eb731fed
-
SHA512
b7e4e62dadfbf9e49fcc66ffde0adc65187eba5200c53f718867e56551409af1cb2eb3da793342ccc9dd13133605945d1265bc24e782d2f69159c90590a1b9c6
-
SSDEEP
768:IlepZzIsVnNiUUIng9NZ7RVpzYL5yqWUuRK4XxIe5E1:dpZzIsngIngT7tzYLjQhIe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 618fc3fbc54d3bb21fb86cf8301feb3c
Files
-
618fc3fbc54d3bb21fb86cf8301feb3c.dll windows:4 windows x86 arch:x86
be97855a8ae95d5147583c56135016e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateThread
ExitThread
HeapFree
HeapAlloc
GetProcessHeap
GetVersionExA
GetSystemInfo
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
GlobalMemoryStatus
GetComputerNameA
MoveFileA
WinExec
FindNextFileA
FindClose
FindFirstFileA
GetLastError
SetCurrentDirectoryA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
WaitForSingleObject
GetWindowsDirectoryA
CopyFileA
OpenProcess
GetModuleFileNameA
ExitProcess
ResetEvent
CreateEventA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
InterlockedExchange
FreeConsole
AllocConsole
GetStdHandle
SetConsoleScreenBufferSize
CreateProcessA
ReadConsoleOutputA
WriteConsoleInputA
FlushConsoleInputBuffer
GetConsoleScreenBufferInfo
TerminateProcess
CreateThread
Sleep
SetConsoleCtrlHandler
GetLocalTime
SetFilePointer
GetFileSize
DeleteFileA
SetEvent
GetCurrentThreadId
WriteFile
GetSystemDirectoryA
CreateFileA
ReadFile
CloseHandle
GetModuleHandleA
GetProcAddress
GetCurrentDirectoryA
LoadLibraryA
user32
keybd_event
SetCursorPos
mouse_event
SetTimer
GetDC
ReleaseDC
CloseWindowStation
CloseDesktop
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
GetKeyNameTextA
PostThreadMessageA
GetKeyState
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
KillTimer
gdi32
DeleteObject
DeleteDC
GetDeviceCaps
CreateDCA
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
MoveToEx
LineTo
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
StartServiceA
ChangeServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
shell32
ShellExecuteA
msvcr80
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_strupr
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_itoa
_wcsupr
_decode_pointer
free
_encoded_null
strstr
??3@YAXPAX@Z
memcpy
memset
??2@YAPAXI@Z
strlen
sprintf
atoi
strcpy
strcat
__CxxFrameHandler3
strcmp
memcmp
wcslen
_encode_pointer
_malloc_crt
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ