Vout
Static task
static1
Behavioral task
behavioral1
Sample
3be243544ae7fafaa6c3e915d0642ac9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3be243544ae7fafaa6c3e915d0642ac9.dll
Resource
win10v2004-20231222-en
General
-
Target
3be243544ae7fafaa6c3e915d0642ac9
-
Size
134KB
-
MD5
3be243544ae7fafaa6c3e915d0642ac9
-
SHA1
ee70b799a5643b8ce69d83f33f74f4049f728b1d
-
SHA256
3bfd393dbddd9f0b74b750f38dc2658777e5db00c4b5963dbbe2c2d35b703446
-
SHA512
57a0e6fe8d3f43c7d563013b7f6c8b9e138ec16d2483d8e11a7f0be252c1107b1285dbfaae55b9e0e1f6ccf31728e6287681ef3af2992d2f80dd00d17b998015
-
SSDEEP
3072:JBWFmmz7J+CBgmEhZBFvoLdikVaAqxmE7Au6bgT:JBWNz7JgZXFkjImy0bg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3be243544ae7fafaa6c3e915d0642ac9
Files
-
3be243544ae7fafaa6c3e915d0642ac9.dll windows:4 windows x86 arch:x86
fb390d916927977b4a21bc08bab74d00
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
ReadFile
CreateFileA
GetWindowsDirectoryA
OpenEventA
GetCurrentProcessId
GetLocalTime
LoadLibraryA
GetCurrentThreadId
CreateEventA
GetSystemDirectoryA
SetFilePointer
WriteProcessMemory
VirtualAllocEx
DeleteFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
OpenProcess
Process32Next
Process32First
TerminateProcess
MultiByteToWideChar
GetFullPathNameA
CopyFileA
GetFileSize
GetProcAddress
WriteFile
GetVersionExA
LockResource
LoadResource
SizeofResource
FindResourceA
VirtualProtectEx
SetThreadPriority
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
WideCharToMultiByte
GetThreadPriority
CreateToolhelp32Snapshot
Thread32First
TerminateThread
CloseHandle
Thread32Next
Sleep
OutputDebugStringA
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
GetPrivateProfileIntA
lstrlenA
LocalAlloc
SetErrorMode
CreateThread
GetPrivateProfileStringA
GetComputerNameA
GlobalAlloc
GlobalLock
GetModuleHandleA
GlobalUnlock
GlobalFree
GetCurrentProcess
ReadProcessMemory
GetModuleFileNameA
FlushFileBuffers
lstrcmpiA
lstrcatA
GetTickCount
user32
wsprintfA
EnumChildWindows
SendMessageA
GetForegroundWindow
FindWindowA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
BlockInput
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
ClientToScreen
GetClientRect
GetClassNameA
IsWindowEnabled
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
advapi32
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
msvcrt
strchr
??2@YAPAXI@Z
strstr
??3@YAXPAX@Z
_CxxThrowException
_ftol
memmove
ceil
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
atoi
realloc
__CxxFrameHandler
ws2_32
htons
gethostbyname
socket
connect
recv
ntohs
WSAStartup
WSACleanup
setsockopt
send
select
closesocket
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
Exports
Exports
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ