Static task
static1
Behavioral task
behavioral1
Sample
3b86769f1ecb6eaffe58b1f4fcd3d940.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b86769f1ecb6eaffe58b1f4fcd3d940.dll
Resource
win10v2004-20231215-en
General
-
Target
3b86769f1ecb6eaffe58b1f4fcd3d940
-
Size
116KB
-
MD5
3b86769f1ecb6eaffe58b1f4fcd3d940
-
SHA1
526fe9ab19e67f6559a90b605d70eca2e0a815b7
-
SHA256
e2253908d097db5595ce2595b010b4ea28dbf5834e69f3d14dc7af114a6c56b7
-
SHA512
6bccffbb560fc5319777df1a0299269eef839ee1ce64557c82415c2048fe1e0e075772ebd2dde3269205f042c733b7878c3f5dfa61c5ce7e133bd22143919b0f
-
SSDEEP
1536:dc4OGZBp1c5iEDeA/CDP4QmJXO7Itooc0mCXR3qX0mR0pSMFy:dcIB8zehwQCXO7Itooc78oEmRv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b86769f1ecb6eaffe58b1f4fcd3d940
Files
-
3b86769f1ecb6eaffe58b1f4fcd3d940.dll windows:4 windows x86 arch:x86
b817aa62908c3a233b05947328b8226f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
HeapReAlloc
VirtualAlloc
WideCharToMultiByte
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetVersion
RtlUnwind
HeapFree
HeapAlloc
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetCommandLineA
FreeResource
WriteFile
lstrlenA
lstrcpyA
GetTickCount
lstrcpynA
DeleteFileA
InterlockedDecrement
LocalAlloc
LocalFree
GetShortPathNameA
GetCurrentDirectoryA
TlsSetValue
DuplicateHandle
GetCurrentProcess
GetCurrentThread
TlsGetValue
SetEvent
CloseHandle
WaitForSingleObject
CreateThread
ResetEvent
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetVersionExA
TlsAlloc
TlsFree
GetCurrentProcessId
InterlockedExchangeAdd
InterlockedIncrement
VirtualProtect
VirtualFree
GetStringTypeW
user32
MoveWindow
SendMessageA
wsprintfA
DestroyWindow
InvalidateRect
GetWindowLongA
SetDlgItemTextA
GetParent
ShowWindow
PostMessageA
DefWindowProcA
SetTimer
CreateWindowExA
RegisterClassA
CharNextA
LoadStringA
GetSystemMetrics
LoadAcceleratorsA
LoadIconA
GetWindowRect
SetWindowLongA
GetSysColor
IsWindowEnabled
EndDialog
GetTopWindow
SendDlgItemMessageA
GetDC
GetDlgItem
ReleaseDC
SetFocus
IsZoomed
IsIconic
EnableMenuItem
SetWindowTextA
GetWindowPlacement
SetForegroundWindow
advapi32
GetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
EqualSid
CryptGetUserKey
CryptExportKey
RegOpenKeyExW
RegCreateKeyExA
RegFlushKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegOpenKeyA
CryptCreateHash
GetSecurityDescriptorLength
RegCloseKey
CryptReleaseContext
GetLengthSid
CryptAcquireContextW
CryptAcquireContextA
CryptDestroyKey
LookupAccountSidW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
SetKernelObjectSecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
AddAce
GetAce
InitializeAcl
GetAclInformation
CryptImportKey
gdi32
RealizePalette
SelectPalette
SetTextColor
SetBkColor
SelectObject
GetTextExtentPoint32A
BitBlt
CreateCompatibleDC
CreateDIBSection
GetStockObject
DeleteDC
rpcrt4
NdrClientCall2
UuidCreate
UuidFromStringW
RpcMgmtSetCancelTimeout
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ