Static task
static1
Behavioral task
behavioral1
Sample
18501bcc60da64d3dd462e9974078950.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18501bcc60da64d3dd462e9974078950.dll
Resource
win10v2004-20231215-en
General
-
Target
18501bcc60da64d3dd462e9974078950
-
Size
200KB
-
MD5
18501bcc60da64d3dd462e9974078950
-
SHA1
76be5e30a7bfe26b5b1c8227cbc0d5cc8f01c3c6
-
SHA256
434b1dfa7a6b43a8478b35b1a5b56273ed056b0cec1fac1acf1c82b294c0fdfb
-
SHA512
49a77db9becf07a4fd07da59e90c905efd82b9cab93311f21fb7c1765834a280fd3389f35c106f643f48574cf377484cbf00aca2e9ae6688c939c3879fc77ee6
-
SSDEEP
3072:4FmlNWsx27DeNxfpxdxHxN4298Vz3PnIFdk52KZ3WbrQXYV11O5gZdUlHpMBvRt/:HWev98VzwHVf8MBvRtTmHPib
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18501bcc60da64d3dd462e9974078950
Files
-
18501bcc60da64d3dd462e9974078950.dll windows:4 windows x86 arch:x86
02cbcbc6ed8f219eadcace2c5bd1c38c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryW
Sleep
GetLastError
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
GetProcAddress
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FindClose
SetFilePointer
FindFirstFileW
SetEndOfFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
advapi32
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
ole32
CoInitialize
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ