Static task
static1
Behavioral task
behavioral1
Sample
0e415423656dd289281d99cf746c90d5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e415423656dd289281d99cf746c90d5.dll
Resource
win10v2004-20231215-en
General
-
Target
0e415423656dd289281d99cf746c90d5
-
Size
124KB
-
MD5
0e415423656dd289281d99cf746c90d5
-
SHA1
b756d519380cc3d340396ffa2c63e8abf7a3c862
-
SHA256
b340eb691bf020583356ce353b4ac612aca2f0a54209f1f37c3ba04f76dc8687
-
SHA512
2a8b2b57f697f0cc88c9d4bd195a6bb59671b7ce03edbd40da4608b085dcd1c98370d0c97bb14b8814b89c835e782572cd3be99e8e5fb6f5caf105af4ffa7f8c
-
SSDEEP
3072:TXAOeUTg7o0HEVhkPK7HmdBFyMXAZrJ0mVY3HfwjlLSv9nrPOD:0bUT10LPKaXyIHfwsRPOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e415423656dd289281d99cf746c90d5
Files
-
0e415423656dd289281d99cf746c90d5.dll windows:4 windows x86 arch:x86
d869ac033d5ed8a3448dc4e8d0c35df3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateNamedPipeW
CreateThread
CreateMutexW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
GetTempPathW
DisableThreadLibraryCalls
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
ConnectNamedPipe
SetEvent
CreateEventW
WaitForMultipleObjects
DisconnectNamedPipe
GetProcAddress
FreeLibrary
OpenProcess
GetVersionExW
ProcessIdToSessionId
GetCurrentProcess
DuplicateHandle
VirtualProtect
GetProcessHeap
GetCurrentThread
LocalFree
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
GetSystemDirectoryW
LoadLibraryExW
GetSystemWindowsDirectoryW
CreateDirectoryW
GetCommandLineA
SetUnhandledExceptionFilter
LCMapStringA
HeapSize
LoadLibraryA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetSystemInfo
user32
OpenWindowStationW
GetUserObjectInformationW
wsprintfA
CloseWindowStation
advapi32
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
RevertToSelf
OpenThreadToken
ImpersonateNamedPipeClient
GetSecurityInfo
CreateProcessAsUserW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetServiceStatus
RegisterServiceCtrlHandlerExW
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
DuplicateToken
AddAccessDeniedAce
AccessCheck
GetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFromStringBindingW
RpcBindingFree
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ