Static task
static1
Behavioral task
behavioral1
Sample
1ead921aa115961d97f568ed680c9aca.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ead921aa115961d97f568ed680c9aca.dll
Resource
win10v2004-20231215-en
General
-
Target
1ead921aa115961d97f568ed680c9aca
-
Size
240KB
-
MD5
1ead921aa115961d97f568ed680c9aca
-
SHA1
0f55937346a14734e699caa5b7e59f6df022004a
-
SHA256
22a7a9268f6e5e2b506950192dda020aadeaa9771b929f49280065a816c6985d
-
SHA512
b6e55d4eea43ba2e4a7afcce2dbc105411c3866d8ac682dd459be50e63715097530100fadebd5c0de9b4c72735662b53838fb98de1eac6278a2506fbb96103da
-
SSDEEP
3072:rIcSe1HAnAXoxCmFBDj6O+7zrpulLhlGs6ZFwAsbUiS2Uc5CfXUhR+:rIZ2EAmVuNzrpiu9abUiS2pgfmR+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ead921aa115961d97f568ed680c9aca
Files
-
1ead921aa115961d97f568ed680c9aca.dll windows:5 windows x86 arch:x86
c818b151fcc8cacfb9c8dfffad2994d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpyA
FindFirstFileW
GetWindowsDirectoryA
GetTempPathW
FindClose
GetModuleFileNameA
WinExec
GetTempPathA
DeleteFileA
CreateMutexW
GetCurrentThread
LoadLibraryW
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
GetModuleHandleW
SizeofResource
GetProcAddress
lstrcmpiW
GetTempFileNameW
CreateFileA
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileW
TerminateProcess
OpenMutexW
ExitProcess
SystemTimeToFileTime
VirtualFree
VirtualAlloc
VirtualQuery
VirtualProtect
InterlockedCompareExchange
GetSystemTime
GetThreadContext
SetThreadContext
SuspendThread
SetLastError
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetStdHandle
HeapReAlloc
HeapDestroy
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
IsDebuggerPresent
DeleteFileW
lstrcatA
IsBadWritePtr
lstrcpynA
CreateThread
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
WaitForMultipleObjects
ResumeThread
EnterCriticalSection
GetLastError
InterlockedExchange
RaiseException
FlushInstructionCache
GlobalUnlock
MultiByteToWideChar
lstrcmpW
InterlockedIncrement
GetModuleFileNameW
MulDiv
LeaveCriticalSection
GlobalAlloc
InitializeCriticalSection
GlobalLock
GetCurrentProcess
lstrlenA
lstrcmpiA
lstrlenW
Sleep
GetTickCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedDecrement
user32
GetWindow
MoveWindow
GetDlgItem
ReleaseDC
GetClassNameW
GetWindowTextW
GetWindowLongW
TranslateMessage
SetRect
RegisterClassExW
GetDC
GetClassInfoExW
BeginPaint
SetFocus
CreateAcceleratorTableW
GetClientRect
LoadCursorW
InvalidateRgn
GetParent
GetFocus
UnregisterClassW
SetCapture
DefWindowProcW
CallWindowProcW
SetWindowTextW
SendMessageW
IsChild
FillRect
RegisterWindowMessageW
CharNextW
ScreenToClient
DestroyAcceleratorTable
GetWindowTextLengthW
DestroyWindow
ClientToScreen
EndPaint
PeekMessageW
MessageBoxW
DispatchMessageW
ReleaseCapture
CreateWindowExW
IsWindow
ShowWindow
SetWindowPos
GetSysColor
GetDesktopWindow
RedrawWindow
InvalidateRect
UnregisterClassA
SetWindowLongW
gdi32
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
GetStockObject
CreateSolidBrush
BitBlt
advapi32
RegOpenKeyExW
RegOpenKeyA
RegSetValueExA
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegCreateKeyA
shell32
SHGetSpecialFolderPathW
ole32
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
StringFromGUID2
OleInitialize
CLSIDFromString
CoUninitialize
CoCreateInstance
CoInitialize
CoGetClassObject
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
OleUninitialize
oleaut32
SysAllocString
OleCreateFontIndirect
SysAllocStringLen
VariantInit
LoadTypeLi
VarUI4FromStr
SysFreeString
LoadRegTypeLi
SysStringLen
VariantClear
shlwapi
StrCatW
StrStrIW
StrCmpNIW
wnsprintfA
StrCpyW
StrCpyNW
StrNCatW
StrCmpIW
StrStrIA
StrCmpNIA
PathAddBackslashW
SHDeleteValueA
PathFileExistsW
wininet
InternetCrackUrlW
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
FindCloseUrlCache
HttpAddRequestHeadersW
HttpAddRequestHeadersA
InternetOpenUrlA
InternetReadFile
InternetSetOptionW
InternetCloseHandle
InternetOpenA
winmm
waveOutWrite
urlmon
ObtainUserAgentString
ws2_32
closesocket
WSAStartup
gethostbyname
socket
htons
WSAGetLastError
select
connect
ioctlsocket
crypt32
CryptStringToBinaryA
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ