Static task
static1
Behavioral task
behavioral1
Sample
7217989256f1a783b1ebdccb34bfe83e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7217989256f1a783b1ebdccb34bfe83e.dll
Resource
win10v2004-20231215-en
General
-
Target
7217989256f1a783b1ebdccb34bfe83e
-
Size
220KB
-
MD5
7217989256f1a783b1ebdccb34bfe83e
-
SHA1
af989b4a2e0ac0b37cf435e445b518cd533411fb
-
SHA256
98c92949c843f17e7132468facdab7c53c4321ad9a201fc4a2d61164c6a49e0e
-
SHA512
7086d1f028824512014d420e356f40a10610cbd2eab9b459a7b1f32e431a8485a32761658381badc85ca6e8057e136b706cb3f79daa720a5ef53e0e8924dbc78
-
SSDEEP
3072:jZJpUIqVp3PiL641ZpRnAFAnPBZaQTICacYv0Z1myoXpkx1TzjmHy4YJVpdvujS7:KdpflqZpRtBZZWf0rmNXOxcSpX3u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7217989256f1a783b1ebdccb34bfe83e
Files
-
7217989256f1a783b1ebdccb34bfe83e.dll windows:4 windows x86 arch:x86
5831c3e825ae557f6c5e4ce24fe7793c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
gdi32
GetPaletteEntries
CreateDIBSection
CopyEnhMetaFileA
SelectObject
GetCurrentPositionEx
CreateBrushIndirect
LineTo
SelectPalette
BitBlt
GetBitmapBits
kernel32
GetModuleHandleA
GetProcAddress
EnterCriticalSection
VirtualAlloc
VirtualFree
VirtualAllocEx
LocalAlloc
lstrlenA
SetHandleCount
SetEndOfFile
MulDiv
GetVersionExA
GlobalAlloc
ExitThread
MoveFileExA
GetEnvironmentStrings
GetACP
GetCommandLineA
GetLastError
shell32
Shell_NotifyIconA
SHGetDesktopFolder
SHGetDiskFreeSpaceA
version
VerQueryValueA
GetFileVersionInfoA
user32
GetKeyboardLayout
CharLowerA
ActivateKeyboardLayout
CreateMenu
ShowOwnedPopups
PeekMessageW
DrawFrameControl
SendMessageA
SetScrollPos
ShowScrollBar
LoadCursorA
LoadBitmapA
CreatePopupMenu
CharNextA
GetKeyNameTextA
SetFocus
TrackPopupMenu
DrawEdge
CallNextHookEx
GetSysColorBrush
GetMenu
GetSubMenu
LoadIconA
GetClientRect
GetIconInfo
MoveWindow
GetMenuState
RedrawWindow
GetCursorPos
SystemParametersInfoA
GetForegroundWindow
PostMessageA
GetWindowRect
IsIconic
RegisterClassA
DispatchMessageW
GetDesktopWindow
IsWindowEnabled
DrawTextA
GetClassNameA
FrameRect
GetKeyboardLayoutList
InsertMenuItemA
CallWindowProcA
TranslateMDISysAccel
UpdateWindow
GetFocus
IsRectEmpty
GetMenuStringA
SetWindowPos
DestroyIcon
WindowFromPoint
InvalidateRect
EnumChildWindows
DestroyCursor
PtInRect
MessageBoxA
GetActiveWindow
SetWindowLongA
GetScrollPos
GetWindowLongW
RemoveMenu
DestroyMenu
LoadKeyboardLayoutA
IsChild
LoadStringA
GetDlgItem
GetWindow
EnableScrollBar
DrawIconEx
SetParent
SetMenu
GetMenuItemCount
CreateWindowExA
MessageBeep
OemToCharA
GetCapture
GetMenuItemInfoA
ScrollWindow
DrawMenuBar
EndPaint
InflateRect
GetSystemMenu
SetCapture
SetScrollRange
SetClassLongA
InsertMenuA
SetWindowPlacement
ChildWindowFromPoint
ScreenToClient
IsDialogMessageA
SetWindowsHookExA
KillTimer
DispatchMessageA
PeekMessageA
AdjustWindowRectEx
UnregisterClassA
SetMenuItemInfoA
GetSystemMetrics
IsWindowUnicode
GetMessagePos
GetWindowPlacement
GetDC
ClientToScreen
EnableWindow
OffsetRect
SetRect
WaitMessage
MsgWaitForMultipleObjects
GetWindowThreadProcessId
GetClassInfoA
RegisterClipboardFormatA
GetKeyboardLayoutNameA
SendMessageW
SetScrollInfo
RemovePropA
DrawIcon
CloseClipboard
GetClipboardData
GetDCEx
FillRect
GetPropA
GetLastActivePopup
IsZoomed
DefWindowProcA
SetTimer
SetWindowLongW
IntersectRect
FindWindowA
GetTopWindow
MapWindowPoints
EnumWindows
SetForegroundWindow
DefFrameProcA
EnumThreadWindows
DeleteMenu
GetScrollInfo
ShowWindow
EnableMenuItem
wsprintfA
CharUpperBuffA
DestroyWindow
SetActiveWindow
MapVirtualKeyA
OpenClipboard
SetPropA
GetWindowTextA
GetWindowDC
SetClipboardData
PostQuitMessage
IsDialogMessageW
EqualRect
GetParent
BeginPaint
DrawAnimatedRects
CharNextW
IsWindow
CreateIcon
TranslateMessage
EmptyClipboard
ReleaseDC
GetCursor
GetMenuItemID
CharToOemA
GetScrollRange
UnhookWindowsHookEx
IsWindowVisible
GetClassLongA
SetCursor
GetKeyboardType
ReleaseCapture
DefMDIChildProcA
CheckMenuItem
CharLowerBuffA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 177KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ