Static task
static1
Behavioral task
behavioral1
Sample
f7c8e054f08cf9910e89f8efe041317e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f7c8e054f08cf9910e89f8efe041317e.dll
Resource
win10v2004-20231215-en
General
-
Target
f7c8e054f08cf9910e89f8efe041317e
-
Size
191KB
-
MD5
f7c8e054f08cf9910e89f8efe041317e
-
SHA1
539e5947a598cdeeeefabda5798e0e69f61c5d98
-
SHA256
af456a77ca8f8cfe26aaec88fa1ee1193dbdb6cc620400e1d0ac1551304958ee
-
SHA512
6da19554bbdee72430ef6d4bfed04c212db386194dcb6b50f741c5ff686520f6f1c95ba9735e3df94a439f388affa5ef294f5b4a33b2d90cae56f61fec69e9a0
-
SSDEEP
3072:/ZhOrn9SydJsGRRgDsLNA4g4iHjce8f8RLKeKb11Oe7ijj/QHl:/Z8uGRRCSKH1g8RuB1Oee
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7c8e054f08cf9910e89f8efe041317e
Files
-
f7c8e054f08cf9910e89f8efe041317e.dll windows:4 windows x86 arch:x86
9d8d67f9aa6c19eeda11be1e6ff2d16b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
wcscspn
memmove
cos
sin
strncmp
memcpy
memset
comdlg32
ChooseColorA
user32
GetScrollPos
DestroyWindow
ShowOwnedPopups
GetWindowPlacement
MoveWindow
GetWindowLongA
SetWindowPlacement
EndPaint
CharNextW
DefFrameProcA
GetSystemMetrics
DispatchMessageA
DrawTextA
GetKeyboardLayoutList
UpdateWindow
TranslateMessage
LoadKeyboardLayoutA
GetClientRect
ReleaseDC
ShowWindow
DrawFrameControl
OpenClipboard
GetMenuStringA
GetWindowThreadProcessId
GetMenu
CharLowerBuffA
GetIconInfo
ActivateKeyboardLayout
ScreenToClient
CharNextA
ClientToScreen
GetForegroundWindow
FindWindowA
OffsetRect
GetClassInfoA
SetRect
PostQuitMessage
IsWindowVisible
TranslateMDISysAccel
GetMenuItemCount
GetClassNameA
EnableMenuItem
CreateMenu
IntersectRect
PtInRect
FrameRect
GetSystemMenu
RemovePropA
PostMessageA
GetKeyboardLayout
GetKeyboardState
GetKeyboardType
ShowScrollBar
SystemParametersInfoA
IsIconic
MsgWaitForMultipleObjects
SetScrollRange
GetDCEx
SetPropA
CallWindowProcA
SetActiveWindow
SetWindowLongW
SetClipboardData
DestroyIcon
ScrollWindow
UnregisterClassA
LoadIconA
GetDesktopWindow
GetKeyboardLayoutNameA
DeleteMenu
DrawMenuBar
SetWindowPos
DrawIconEx
WindowFromPoint
GetKeyNameTextA
CheckMenuItem
EqualRect
PeekMessageW
CharToOemA
GetWindowDC
SetScrollPos
RegisterClipboardFormatA
DestroyMenu
MapWindowPoints
GetClipboardData
IsDialogMessageA
RegisterWindowMessageA
GetScrollRange
DispatchMessageW
SetParent
DefMDIChildProcA
SetForegroundWindow
ChildWindowFromPoint
CharLowerA
GetWindow
EmptyClipboard
CharUpperBuffA
GetPropA
SetTimer
AdjustWindowRectEx
SetCapture
GetCursorPos
MessageBoxA
GetActiveWindow
IsChild
wsprintfA
CreatePopupMenu
SetWindowsHookExA
GetWindowLongW
RedrawWindow
KillTimer
InflateRect
EnumThreadWindows
TrackPopupMenu
SetMenu
GetScrollInfo
MessageBeep
RegisterClassA
GetCapture
FillRect
EnableWindow
CloseClipboard
GetMessagePos
GetFocus
SetWindowTextA
OemToCharA
InvalidateRect
ReleaseCapture
IsWindowUnicode
GetMenuState
DefWindowProcA
IsZoomed
GetDC
CallNextHookEx
RemoveMenu
GetMenuItemInfoA
GetCursor
GetWindowTextA
SetWindowLongA
SetCursor
DrawAnimatedRects
CreateWindowExA
SendMessageW
EnumWindows
GetSysColorBrush
SetFocus
EnumChildWindows
CreateIcon
SendMessageA
LoadCursorA
DrawIcon
GetKeyState
GetDlgItem
GetLastActivePopup
BeginPaint
GetWindowRect
LoadBitmapA
UnhookWindowsHookEx
IsWindowEnabled
WaitMessage
MapVirtualKeyA
GetSysColor
PeekMessageA
EnableScrollBar
DestroyCursor
InsertMenuItemA
IsWindow
InsertMenuA
GetParent
DrawEdge
GetTopWindow
IsRectEmpty
SetMenuItemInfoA
GetMenuItemID
SetClassLongA
IsDialogMessageW
LoadStringA
SetScrollInfo
GetClassLongA
shlwapi
PathIsDirectoryA
SHSetValueA
SHDeleteKeyA
SHQueryInfoKeyA
SHQueryValueExA
SHDeleteValueA
kernel32
GetDiskFreeSpaceA
SetThreadLocale
VirtualFree
GetFileAttributesA
GetModuleHandleA
FormatMessageA
SetErrorMode
WriteFile
LocalReAlloc
SizeofResource
WaitForSingleObject
EnumCalendarInfoA
GetFileSize
FindFirstFileA
GetProcAddress
ExitProcess
GlobalAlloc
VirtualQuery
lstrlenA
GetStdHandle
GetDateFormatA
GlobalDeleteAtom
GetCurrentThread
HeapAlloc
InitializeCriticalSection
ReadFile
FindClose
ExitThread
GetEnvironmentStrings
GetThreadLocale
GlobalAddAtomA
GetOEMCP
FindResourceA
CompareStringA
lstrcpyA
GetTickCount
FreeResource
CreateEventA
CloseHandle
ResetEvent
GetLastError
FreeLibrary
WideCharToMultiByte
GetFileType
lstrcmpiA
GetProcessHeap
LoadLibraryExA
GetModuleFileNameA
GetLocalTime
lstrcatA
DeleteFileA
SetEndOfFile
SetHandleCount
SetLastError
GetVersion
GetCPInfo
Sleep
VirtualAllocEx
LoadResource
lstrcpynA
GlobalFindAtomA
lstrcmpA
SetEvent
HeapFree
MoveFileA
GetStringTypeW
GetStringTypeA
LoadLibraryA
RaiseException
LocalFree
VirtualAlloc
CreateThread
GetSystemDefaultLangID
GetACP
GetVersionExA
MulDiv
EnterCriticalSection
CreateFileA
GetCurrentThreadId
GetFullPathNameA
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
GetLocaleInfoA
GetCurrentProcessId
LocalAlloc
GetUserDefaultLCID
GetCurrentProcess
HeapDestroy
LockResource
version
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 66B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ