Static task
static1
Behavioral task
behavioral1
Sample
16a6dd801798cc34d110c82e467b5bc6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16a6dd801798cc34d110c82e467b5bc6.dll
Resource
win10v2004-20231215-en
General
-
Target
16a6dd801798cc34d110c82e467b5bc6
-
Size
48KB
-
MD5
16a6dd801798cc34d110c82e467b5bc6
-
SHA1
514505a9dd338b697cfcef53840085e49d6cd65a
-
SHA256
c2595accdb9c39f8d23f468a5cbbd7eac928ad8ed35877027bf2018bc52ee597
-
SHA512
5cce37df4fa53dde760c1a11a25755e8feecdf1ebf99913e7316dfa22ad29d744f525f008455a1ca408be76a10b906a7feb6af3c0334db0541b58223a6446671
-
SSDEEP
768:AX+nGDiiPRXrRQr7x1szGq8UKx9gcVRxEAkzhtCodGGEnGiFO3ou4i:6+GDiiZEmeUCg8PkFtCUGGEn64i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16a6dd801798cc34d110c82e467b5bc6
Files
-
16a6dd801798cc34d110c82e467b5bc6.dll windows:5 windows x86 arch:x86
ecdcba60af62dce3f56961a1017710ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
strstr
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
memset
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
ws2_32
bind
sendto
setsockopt
gethostname
WSAResetEvent
socket
WSAStartup
getaddrinfo
WSACleanup
freeaddrinfo
WSAAddressToStringA
gethostbyname
WSACreateEvent
closesocket
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
psapi
GetModuleFileNameExA
GetModuleInformation
rpcrt4
UuidFromStringA
UuidToStringA
wintrust
WinVerifyTrust
wininet
GetUrlCacheEntryInfoA
kernel32
GetTickCount
ExitProcess
GetSystemDirectoryA
CreateThread
GetFileTime
FindNextFileA
CopyFileA
DeviceIoControl
GetModuleFileNameA
ResumeThread
TransactNamedPipe
TerminateProcess
GlobalAlloc
GlobalFree
lstrcpyA
SetEvent
GetCurrentThreadId
OpenThread
CreateNamedPipeA
FlushFileBuffers
DisconnectNamedPipe
ExitThread
Thread32Next
OpenEventA
GetExitCodeThread
CreateFileMappingA
FindClose
ConnectNamedPipe
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
CreateToolhelp32Snapshot
FreeLibrary
GetCurrentProcessId
CreateFileA
lstrlenA
OpenProcess
Sleep
ReadFile
lstrcmpiA
WinExec
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
GetProcAddress
LoadLibraryA
GetModuleHandleA
LoadLibraryExA
GetFileSize
SetFilePointer
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetEndOfFile
WaitForSingleObject
RemoveDirectoryA
FlushViewOfFile
SetFileTime
GetWindowsDirectoryA
WriteFile
GetDriveTypeA
TerminateThread
CreateEventA
GetExitCodeProcess
CreateProcessA
lstrcatA
MultiByteToWideChar
FindFirstFileA
GetLogicalDriveStringsA
GetLocalTime
user32
SetProcessWindowStation
OpenDesktopA
wsprintfA
OpenWindowStationA
SetThreadDesktop
advapi32
CreateProcessAsUserA
CloseServiceHandle
RegSetValueExA
CreateServiceA
StartServiceA
RegOpenKeyExA
OpenSCManagerA
RegCloseKey
OpenProcessToken
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ