Static task
static1
Behavioral task
behavioral1
Sample
059049b9d82db79551566b0340e8c603.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
059049b9d82db79551566b0340e8c603.dll
Resource
win10v2004-20231215-en
General
-
Target
059049b9d82db79551566b0340e8c603
-
Size
176KB
-
MD5
059049b9d82db79551566b0340e8c603
-
SHA1
38dbc86d814eaaab2247ce835db8b90eb920ccc3
-
SHA256
288cfa29152d77df92a8e8c1ab5c8db45fcaf211b8228469222d7de8a4671be4
-
SHA512
54788418d3b0e0ca67e12f0af1228e5489b6f8cd851bd394a3b8ea770ca91b449ab5d189fd0fab94381acae59b562403127f27a26c81fc5b38fdc4f3d1ddcfa3
-
SSDEEP
3072:X0MSP1fSJ3zS8Uw57a24hB24lqwbzSptSTOaIISpMt2U:QL8T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 059049b9d82db79551566b0340e8c603
Files
-
059049b9d82db79551566b0340e8c603.dll windows:4 windows x86 arch:x86
a24f3cbf6d4bad19efa3089fd20c78dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
Sleep
GetTickCount
CreateEventW
WaitForSingleObject
SetEvent
CreateThread
GetProcAddress
TerminateProcess
SetLastError
GetCurrentProcessId
GetLastError
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
CreateProcessW
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetTempFileNameW
WideCharToMultiByte
GetSystemTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
ExitProcess
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoInitializeEx
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoInitialize
CoUninitialize
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetAttemptConnect
shlwapi
SHDeleteKeyW
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ