ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
0c72251f7ae00743470e261b78b2f28a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c72251f7ae00743470e261b78b2f28a.dll
Resource
win10v2004-20231215-en
General
-
Target
0c72251f7ae00743470e261b78b2f28a
-
Size
38KB
-
MD5
0c72251f7ae00743470e261b78b2f28a
-
SHA1
8a4f361d4cc9d9b6408d8615dbde7d22402004da
-
SHA256
0dee1205198d46e8a20a340e939298ea861d8fa4890ac762f356e21f9806b6ef
-
SHA512
26e078a1b0ea414e55b684e11a6371e536acf6ce03e14361d13743ebbffd6839d25e7f246d9fa41da1d1fa3833e7ae852e6594682755dc5f81797b9330927232
-
SSDEEP
384:jdE7gj2SXD0Uj1T6hbna+qSYZ7HQUTBYYrHRUWcC:IeXD0e9iFYZ7HQamYsC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c72251f7ae00743470e261b78b2f28a
Files
-
0c72251f7ae00743470e261b78b2f28a.dll windows:4 windows x86 arch:x86
a2c0ddf62d09dcb9a6d00ab1bfff3b97
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DeviceIoControl
GetCurrentProcessId
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
DisableThreadLibraryCalls
ExitProcess
CreateThread
ReadFile
SetFilePointer
FreeLibraryAndExitThread
Sleep
GetSystemDirectoryA
GetStartupInfoA
WaitForSingleObject
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
OpenProcess
MultiByteToWideChar
DeleteFileA
GetProcAddress
FreeLibrary
LoadLibraryA
lstrcmpA
lstrcpyA
lstrlenA
GetVersion
lstrcatA
CreateProcessA
user32
CharUpperA
wsprintfA
advapi32
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
DeleteService
OpenSCManagerA
ControlService
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetSetOptionA
ws2_32
inet_addr
WSAStartup
inet_ntoa
gethostbyname
shlwapi
SHDeleteKeyA
msvcrt
sprintf
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
_except_handler3
strcat
strstr
__CxxFrameHandler
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
strchr
atoi
strlen
strrchr
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 790B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ