Static task
static1
Behavioral task
behavioral1
Sample
21dfe27f1063229d849e67bdddef33aa.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21dfe27f1063229d849e67bdddef33aa.dll
Resource
win10v2004-20231222-en
General
-
Target
21dfe27f1063229d849e67bdddef33aa
-
Size
22KB
-
MD5
21dfe27f1063229d849e67bdddef33aa
-
SHA1
3aec71429dca07f882d245e6a2c99b57d91804f9
-
SHA256
a3ffbbed2c26daf638197dfd23f9d07e63514e0a65a0762b5056d561ee606e56
-
SHA512
6f5023fcdc9a3515b0f28ead2be7b7928276abf33898a52562777e2954bca8b1267c7dcff84b9c9efff7b284c87fbd70839ccf8238e6047aa89b4b02a8a455e2
-
SSDEEP
384:1JfsYGRClJzD4mHbDUxVqLM+Rx0LXF7sTTrLwM:HstRiJPHHbDUx8Q+kCTr1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21dfe27f1063229d849e67bdddef33aa
Files
-
21dfe27f1063229d849e67bdddef33aa.dll windows:5 windows x64 arch:x64
d198609123f2ede2fd1b29016f5034aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemDirectoryA
GetLastError
GetProcAddress
Process32Next
GetModuleHandleA
TerminateProcess
ReleaseMutex
CreateThread
GetExitCodeProcess
OpenProcess
HeapAlloc
GetSystemWow64DirectoryA
WaitForSingleObject
Process32First
CloseHandle
OutputDebugStringA
CreateMutexA
Sleep
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapFree
CreateToolhelp32Snapshot
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
advapi32
CloseServiceHandle
OpenServiceA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
ControlService
OpenSCManagerA
RegOpenKeyExA
StartServiceA
RegCloseKey
shell32
ShellExecuteA
iphlpapi
GetIpForwardTable
ws2_32
connect
inet_addr
WSASend
WSAGetLastError
htons
setsockopt
WSAGetOverlappedResult
WSACloseEvent
closesocket
WSAResetEvent
WSASocketA
WSAWaitForMultipleEvents
inet_ntoa
WSAStartup
WSACleanup
WSACreateEvent
recv
msvcr90
memset
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
__crt_debugger_hook
sprintf
strcpy_s
strncpy
rand
srand
_time64
atoi
_encode_pointer
_malloc_crt
_initterm
_initterm_e
free
_encoded_null
_decode_pointer
_amsg_exit
__C_specific_handler
__CppXcptFilter
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ