ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
0b5564322feea56c5e323e0560145830.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b5564322feea56c5e323e0560145830.dll
Resource
win10v2004-20231215-en
General
-
Target
0b5564322feea56c5e323e0560145830
-
Size
74KB
-
MD5
0b5564322feea56c5e323e0560145830
-
SHA1
de97b8228431b444fbb913f30fe43474760c7270
-
SHA256
0e550b1df6bc1a0f317111e8f0f4c446c8991d5bb581a1c14a3f6f598d662898
-
SHA512
886afea512a7a062ea65deb82b9750ea4737a8dc42f6b2c888c982bfe46e2a3ed02d919027f1ac7ee09882e57b3a9c7ab4561c0321c9b63c737b5cc901a12fb9
-
SSDEEP
1536:opLwHEsUt1hwK4hrHULMxTZRKsvSHR6JoVg:0QEs4qDHtVmEJoVg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b5564322feea56c5e323e0560145830
Files
-
0b5564322feea56c5e323e0560145830.dll windows:4 windows x86 arch:x86
b40572cae13d93c40a4e4631a3ed6b43
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
GetModuleFileNameA
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Sleep
CreateThread
MoveFileExA
GetWindowsDirectoryA
MoveFileA
CopyFileA
GetFileSize
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
LCMapStringW
LCMapStringA
FlushFileBuffers
ExitProcess
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
CreatePipe
GetDriveTypeA
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
DeleteFileA
ReadFile
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
HeapReAlloc
HeapFree
RtlUnwind
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
ExitWindowsEx
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
shell32
SHGetFileInfoA
ShellExecuteA
ws2_32
send
WSASocketA
gethostbyname
inet_addr
shutdown
recv
closesocket
connect
socket
htons
WSAStartup
setsockopt
htonl
sendto
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ