Vout
Static task
static1
Behavioral task
behavioral1
Sample
1e6960c59b468dc6334ae57ae5eed4a8.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e6960c59b468dc6334ae57ae5eed4a8.dll
Resource
win10v2004-20231222-en
General
-
Target
1e6960c59b468dc6334ae57ae5eed4a8
-
Size
257KB
-
MD5
1e6960c59b468dc6334ae57ae5eed4a8
-
SHA1
1b155d547080586ed59ba934dc0f6284e0876f6e
-
SHA256
b7576b6a915f79b9edcc01980b243660ea9508d3c41664e80fc77ad3475fe590
-
SHA512
3b4e32b757e2999046b8eea9e1a359c1a99afe2498a54913f63679db74e584361b0e8bb00b0a8141a8d5259561d4219f5e1321796d83f97d77acc61cd8f4a4c6
-
SSDEEP
6144:p+UWH8Z091vMuvdyhheQf2qu4CRPCpTtP9Uk:p+UWKC1vndyyE2quBUTw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e6960c59b468dc6334ae57ae5eed4a8
Files
-
1e6960c59b468dc6334ae57ae5eed4a8.dll windows:4 windows x86 arch:x86
a1206c827a326b4922fe47eedf910e94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCommandLineA
GlobalUnlock
OutputDebugStringA
Thread32Next
TerminateThread
Thread32First
CreateToolhelp32Snapshot
GetThreadPriority
GetWindowsDirectoryA
GetCurrentProcessId
GetLocalTime
LoadLibraryA
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemDirectoryA
SetFilePointer
WriteProcessMemory
VirtualAllocEx
DeleteFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
OpenProcess
MultiByteToWideChar
GetFullPathNameA
CopyFileA
GetFileSize
FlushFileBuffers
WriteFile
VirtualProtectEx
GetVersionExA
LockResource
TerminateProcess
SizeofResource
FindResourceA
SetThreadPriority
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
WideCharToMultiByte
Process32Next
Process32First
CreateFileA
ReadFile
ExitProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
lstrcmpiA
lstrcatA
GetTickCount
GetModuleFileNameA
RtlUnwind
GetStringTypeW
GetStringTypeA
CreateThread
Sleep
OpenEventA
CreateEventA
CloseHandle
IsBadReadPtr
GlobalAlloc
GlobalLock
GetModuleHandleA
ReadProcessMemory
GetProcAddress
GlobalFree
LoadResource
user32
GetForegroundWindow
SendMessageA
EnumChildWindows
FindWindowA
GetWindowTextA
wsprintfA
IsWindowEnabled
ClientToScreen
ToUnicode
GetAsyncKeyState
GetKeyboardState
MapVirtualKeyA
ToAscii
GetDC
ReleaseDC
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
GetKeyState
GetClassNameA
GetClientRect
ExitWindowsEx
BlockInput
keybd_event
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDesktopWindow
GetCursorPos
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
ws2_32
select
send
setsockopt
closesocket
htons
gethostbyname
socket
recv
ntohs
WSAStartup
connect
WSACleanup
inet_ntoa
getpeername
gdi32
GetPixel
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
msvcrt
??2@YAPAXI@Z
??1type_info@@UAE@XZ
free
calloc
_beginthreadex
ceil
memmove
_ftol
__CxxFrameHandler
realloc
??3@YAXPAX@Z
_CxxThrowException
Exports
Exports
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ