Static task
static1
Behavioral task
behavioral1
Sample
1901e1d6f9f65cf3707164ef6478a8ea.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1901e1d6f9f65cf3707164ef6478a8ea.dll
Resource
win10v2004-20231215-en
General
-
Target
1901e1d6f9f65cf3707164ef6478a8ea
-
Size
76KB
-
MD5
1901e1d6f9f65cf3707164ef6478a8ea
-
SHA1
865738fea4d8733f8f9ad6c19fa332ec7574783c
-
SHA256
dcb5c1b1afabb7cd7dd0b8b6d12a76ad9e7c7c243b36300b26472fec288171e3
-
SHA512
ecca186895b608a5236a8942579c35518cda38225806049bc684ecdfbaf00a403ee620cf94f1c9d06475427597f410242a39bdbd5f032d895e8fea6b77167673
-
SSDEEP
1536:9BSjwnh+INGR59d9GivQZCgKyO75Cd5G5s:8woINGdv3d75Cd5G5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1901e1d6f9f65cf3707164ef6478a8ea
Files
-
1901e1d6f9f65cf3707164ef6478a8ea.dll windows:4 windows x86 arch:x86
41429b93bf0a6813a9bb3d5f3101d818
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFileTime
WinExec
CreateDirectoryA
GetComputerNameA
GlobalMemoryStatus
GetVersionExA
ExitProcess
VirtualProtect
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
GetFileTime
GetCurrentProcessId
CreateFileMappingA
MultiByteToWideChar
GetPrivateProfileStringA
GetPrivateProfileIntA
GetTickCount
CreateMutexA
ReleaseMutex
OpenMutexA
GetCommandLineA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
RemoveDirectoryA
DeleteFileA
LocalLock
LocalUnlock
WideCharToMultiByte
GetEnvironmentVariableA
PeekNamedPipe
CreateThread
Sleep
GetFullPathNameA
LoadLibraryA
GetProcAddress
HeapFree
FreeLibrary
GetTempPathA
GetTempFileNameA
CreatePipe
CreateProcessA
WaitForSingleObject
ReadFile
GetLastError
TerminateProcess
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetSystemDirectoryA
MoveFileA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
CreateFileA
GetFileSize
SetFilePointer
GetLocalTime
WriteFile
GetProcessHeap
HeapAlloc
VirtualQuery
user32
wsprintfA
GetClientRect
GetDesktopWindow
DrawTextExA
GetIconInfo
ExitWindowsEx
MessageBoxA
gdi32
CreateFontA
SelectObject
SetTextColor
SetBkColor
SetBkMode
DeleteObject
DeleteDC
GetObjectA
GetBitmapBits
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
GetDIBits
CreateDCA
advapi32
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
LsaNtStatusToWinError
LookupAccountSidA
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserA
GetSecurityInfo
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
shell32
SHGetFileInfoA
ntdll
vsprintf
wcscpy
ZwTerminateThread
NtVdmControl
RtlInitUnicodeString
ZwOpenSection
ZwClose
memcmp
ZwQuerySystemInformation
_chkstk
memcpy
strcmp
strcat
sprintf
strlen
strcpy
memset
memmove
ws2_32
connect
WSAStartup
htonl
bind
WSAGetLastError
listen
accept
ntohs
ioctlsocket
select
__WSAFDIsSet
htons
inet_addr
gethostbyname
socket
send
inet_ntoa
getpeername
recv
closesocket
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ