Static task
static1
Behavioral task
behavioral1
Sample
16d5af06d5657937708dd5ee05f531f4.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16d5af06d5657937708dd5ee05f531f4.dll
Resource
win10v2004-20231215-en
General
-
Target
16d5af06d5657937708dd5ee05f531f4
-
Size
32KB
-
MD5
16d5af06d5657937708dd5ee05f531f4
-
SHA1
cd4e934c3b0056ab02d04dd103c5b5e5d9dcc200
-
SHA256
a8b8f77a1cd9549665533c863137fc1f125fb4b422d9d0c002e7814b0ad98151
-
SHA512
3a4d67c6242222a7179b14b891fad076a263c5bfbcd9af7ce42b439d3e288090f233185716ba4b39f322ab23f5939627bbb6a7dabaedc296c365710e5c8c95aa
-
SSDEEP
384:yCgxmw1RyvnfJ8t8DHlOkCsUZ3629/SgE7zWKiZ9pNez7kMOwyJLzh0Y7:JgDReDHlOkCX9FqHz1zQMOwyJvGG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16d5af06d5657937708dd5ee05f531f4
Files
-
16d5af06d5657937708dd5ee05f531f4.dll windows:4 windows x86 arch:x86
89188f50b60fe1e71260df29d842eb17
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
GetVersionExA
FreeLibrary
VirtualQuery
GetCurrentProcessId
GetProcAddress
LoadLibraryA
VirtualFree
SetFileTime
CreateFileMappingA
MultiByteToWideChar
GetFileTime
GetFullPathNameA
ReadFile
VirtualAlloc
GetFileSize
CreateFileA
WinExec
WriteFile
UnmapViewOfFile
GetTempPathA
Sleep
SetFilePointer
GetDriveTypeA
CreateProcessA
GetStartupInfoA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemTime
CreateThread
GetTickCount
CreateMutexA
ReleaseMutex
WaitForSingleObject
OpenMutexA
GetModuleHandleA
GetCommandLineA
LocalLock
LocalUnlock
GetLastError
TerminateProcess
GetModuleFileNameA
GetSystemDirectoryA
MoveFileA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileA
FindNextFileA
GetTempFileNameA
FindClose
user32
wsprintfA
advapi32
DuplicateTokenEx
CreateProcessAsUserA
GetSecurityInfo
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
LsaNtStatusToWinError
ImpersonateLoggedOnUser
ntdll
NtVdmControl
ZwTerminateThread
RtlInitUnicodeString
sprintf
memmove
ZwOpenSection
ZwClose
ZwQuerySystemInformation
wcscpy
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ