ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
382ab925ee744941ad61d8cb3bf415c0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
382ab925ee744941ad61d8cb3bf415c0.dll
Resource
win10v2004-20231215-en
General
-
Target
382ab925ee744941ad61d8cb3bf415c0
-
Size
75KB
-
MD5
382ab925ee744941ad61d8cb3bf415c0
-
SHA1
121456db8ea6c60e4fe5c2dd5d0d0440a5352f9c
-
SHA256
a1c2ccff622b2c8d10fdaa9ba8de65a8b73ac5068f8cf2bda84a90abbf0442e4
-
SHA512
dbc3fef5cfda8950bca3e7eeb422eed58a69bdc582d607b734b5bd6f8013344c618db808169adbe76f5f5dadf0a1a9dae31016b6fcc178e93b7e0821b811b984
-
SSDEEP
1536:pqKR4Pk4J/zom9NuxMMvTgLhcLSWSdI+XGoqGky:APTo7LHSdtXGo7ky
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 382ab925ee744941ad61d8cb3bf415c0
Files
-
382ab925ee744941ad61d8cb3bf415c0.dll windows:4 windows x86 arch:x86
f3a1907483f4ae3d8512a8788af30617
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Sleep
CreateThread
MoveFileExA
GetWindowsDirectoryA
MoveFileA
CopyFileA
DeleteFileA
GetFileSize
GlobalMemoryStatus
GetCurrentProcess
FileTimeToLocalFileTime
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
LCMapStringW
LCMapStringA
FlushFileBuffers
GetModuleFileNameA
CreateFileA
WriteFile
ExitProcess
GetVersionExA
FindFirstFileA
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
ReadFile
GetComputerNameA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
HeapReAlloc
HeapFree
RtlUnwind
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
ExitWindowsEx
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
advapi32
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
ControlService
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetFileInfoA
ShellExecuteA
ws2_32
sendto
WSASocketA
send
gethostbyname
inet_addr
shutdown
recv
closesocket
connect
socket
htons
WSAStartup
htonl
setsockopt
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ