Static task
static1
Behavioral task
behavioral1
Sample
6c1d5b403dc3886195911260db2ac55d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c1d5b403dc3886195911260db2ac55d.dll
Resource
win10v2004-20231222-en
General
-
Target
6c1d5b403dc3886195911260db2ac55d
-
Size
42KB
-
MD5
6c1d5b403dc3886195911260db2ac55d
-
SHA1
9ef0449ce25f71c933d01968211e0a4a9263bc4d
-
SHA256
eb0a9d05918a2cd47914090a688323b2d3afd447f5b2664be3ce00d475cdce2d
-
SHA512
0ed4ff6023879af115ddba68047cdfa5353f3e453f75dc7d354212ab67e8988ffa2fc9bda0f733bb651b838b9e419fc622b869a3e6cd8f258385d0132ec7aade
-
SSDEEP
768:QCvofXWSIixF5tiPHsS3B2h9CRR58gW0NOHdglCdtb2pGFwe:XofGSIifMxMCf2g89glCdApGi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c1d5b403dc3886195911260db2ac55d
Files
-
6c1d5b403dc3886195911260db2ac55d.dll windows:5 windows x86 arch:x86
c93610baf0229ca6221d33f96d6af0aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
strstr
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
memset
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
ws2_32
bind
sendto
setsockopt
gethostname
WSAResetEvent
socket
WSAStartup
getaddrinfo
WSACleanup
freeaddrinfo
WSAAddressToStringA
gethostbyname
WSACreateEvent
closesocket
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
psapi
GetModuleFileNameExA
GetModuleInformation
rpcrt4
UuidFromStringA
UuidToStringA
wintrust
WinVerifyTrust
wininet
GetUrlCacheEntryInfoA
kernel32
GetSystemDirectoryA
GetTickCount
CopyFileA
lstrcpyA
GetFileTime
FindNextFileA
DeviceIoControl
GetModuleFileNameA
ResumeThread
TransactNamedPipe
TerminateProcess
GlobalAlloc
GlobalFree
GetLocalTime
ExitProcess
UnmapViewOfFile
GetCurrentThreadId
OpenThread
CreateNamedPipeA
GetLastError
FlushFileBuffers
DisconnectNamedPipe
ExitThread
OpenEventA
CreateFileMappingA
FindClose
RemoveDirectoryA
Thread32Next
ConnectNamedPipe
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
CreateToolhelp32Snapshot
FreeLibrary
CreateFileA
lstrlenA
WaitForSingleObject
OpenProcess
TerminateThread
Sleep
ReadFile
lstrcmpiA
GetExitCodeThread
WinExec
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
CreateThread
GetProcAddress
LoadLibraryA
GetModuleHandleA
LoadLibraryExA
GetFileSize
SetFilePointer
MapViewOfFile
GetLogicalDriveStringsA
lstrcpynA
SetEndOfFile
SetEvent
FlushViewOfFile
SetFileTime
GetWindowsDirectoryA
WriteFile
GetDriveTypeA
CreateEventA
GetExitCodeProcess
CreateProcessA
lstrcatA
MultiByteToWideChar
FindFirstFileA
GetCurrentProcessId
user32
SetProcessWindowStation
OpenDesktopA
wsprintfA
OpenWindowStationA
SetThreadDesktop
advapi32
CreateProcessAsUserA
CloseServiceHandle
RegSetValueExA
CreateServiceA
StartServiceA
RegOpenKeyExA
OpenSCManagerA
RegCloseKey
OpenProcessToken
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ