Static task
static1
Behavioral task
behavioral1
Sample
0eee0d989864bb669cec31450d1c55aa.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eee0d989864bb669cec31450d1c55aa.dll
Resource
win10v2004-20231215-en
General
-
Target
0eee0d989864bb669cec31450d1c55aa
-
Size
294KB
-
MD5
0eee0d989864bb669cec31450d1c55aa
-
SHA1
7430476c2007badb0dbd647e4d799394d21c3f9e
-
SHA256
91770a7b3c4c23027f05c9d2e09d828e6fc3235826e6bfde439cd045de5b2a42
-
SHA512
32822de274877b42bdab4c916fa353715f08bd203c94a93a1b6fdcdb75c50e562d9334740362531da23d47660b604b7bfea8326f6da9d7724c31b049dfd31a25
-
SSDEEP
6144:f5HbMtO6yZBjrACy92JYodR1WjBG3Bu85HXCXo+ZAOKAO+NpnA:f5HbM3yR11WsQYHXWo+ZQO5A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0eee0d989864bb669cec31450d1c55aa
Files
-
0eee0d989864bb669cec31450d1c55aa.dll windows:6 windows x86 arch:x86
168720f5ca3c4860f9ac733c2dd08f3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
gdi32
GetStockObject
user32
UpdateWindow
DefWindowProcW
DispatchMessageW
SendMessageW
RegisterClassW
CreateWindowExW
ShowWindow
TranslateMessage
FindWindowW
PostQuitMessage
GetMessageW
DestroyWindow
GetWindowThreadProcessId
GetWindow
GetClassNameW
GetWindowTextW
GetWindowTextA
GetForegroundWindow
keybd_event
GetClassNameA
MapVirtualKeyW
GetTopWindow
ws2_32
htons
WSAStartup
setsockopt
send
WSACleanup
recv
socket
closesocket
gethostbyname
connect
crypt32
CryptStringToBinaryA
CertCloseStore
CertFindCertificateInStore
CertAddCertificateContextToStore
CertFreeCertificateContext
CertOpenStore
CertCreateCertificateContext
wininet
InternetSetOptionW
InternetQueryOptionW
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
kernel32
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidLocale
LoadLibraryExW
UnhandledExceptionFilter
ReadConsoleW
GetConsoleMode
GetConsoleCP
RtlUnwind
RaiseException
GetCPInfo
GetOEMCP
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
CompareStringW
LCMapStringW
SetFilePointerEx
SetUnhandledExceptionFilter
GetLocaleInfoW
IsValidCodePage
GetStdHandle
GetProcessHeap
SetLastError
DeleteCriticalSection
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetEndOfFile
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetACP
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
WaitForSingleObject
GetTickCount
Sleep
CloseHandle
CreateThread
CreateFileA
GetFileSize
GetPrivateProfileIntA
GetFileAttributesA
CreateDirectoryA
GetPrivateProfileStringA
DeleteFileA
FindFirstFileW
FindResourceW
FreeLibrary
LoadResource
GetCurrentProcess
CreateDirectoryW
OutputDebugStringW
GetModuleHandleW
GetPrivateProfileStringW
WriteFile
K32GetModuleFileNameExW
OpenProcess
WideCharToMultiByte
CopyFileW
SizeofResource
GetFileAttributesW
TerminateProcess
ReadFile
CreateFileW
MultiByteToWideChar
GetTempPathW
GetLastError
GetProcAddress
FindClose
LockResource
FindNextFileW
GlobalDeleteAtom
SetFilePointer
GetSystemTimeAsFileTime
LoadLibraryW
GetModuleFileNameW
GetPrivateProfileIntW
GlobalGetAtomNameA
DeleteFileW
EncodePointer
DecodePointer
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
GetCommandLineA
GetCurrentThreadId
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ