Static task
static1
Behavioral task
behavioral1
Sample
421a540467f81083dd652d78ba2b9744.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
421a540467f81083dd652d78ba2b9744.dll
Resource
win10v2004-20231222-en
General
-
Target
421a540467f81083dd652d78ba2b9744
-
Size
132KB
-
MD5
421a540467f81083dd652d78ba2b9744
-
SHA1
ce752a4cfd0d1f460bc41e662f487371c3ba892e
-
SHA256
618043e20fc0abd33cf23756da39b73901c9eaa7fd505f95c3c6ae6028bea738
-
SHA512
691234e60bbe18b9fce5cd44f500f41c39a0cf4862e1348718b4944ee6558135714f0d35c82db35e72a7f42e934b00dde20e2bfa2b19920b53427b30cb9adfa9
-
SSDEEP
3072:bm8K7Y0dBa/EIyvdza3m6AhIfYl3/YGlnMqqDLy/NlK1pn:y8K75BjaWNhIfYOLqqDLuNgn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 421a540467f81083dd652d78ba2b9744
Files
-
421a540467f81083dd652d78ba2b9744.dll windows:4 windows x86 arch:x86
0f280a34b7e12843a89ee288de7e3b6b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetErrorMode
GetDiskFreeSpaceW
VirtualAlloc
VirtualFree
CreateFileW
GetFileAttributesExW
LocalAlloc
LoadLibraryA
GetSystemTimeAsFileTime
LoadLibraryW
GetLocaleInfoA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateThread
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
SetFileAttributesW
LocalFree
GetModuleHandleW
CloseHandle
GetComputerNameW
LocalSize
SetUnhandledExceptionFilter
GetCurrentProcess
VirtualProtect
TerminateProcess
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
GetConsoleOutputCP
MultiByteToWideChar
GetUserDefaultLangID
GetProcessHeap
GetCommandLineA
GetStringTypeW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
HeapCreate
HeapDestroy
GetModuleFileNameA
GetStartupInfoA
GetFileType
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
SetHandleCount
GetStdHandle
GetSystemInfo
user32
LoadStringW
wsprintfW
EndDialog
SendDlgItemMessageW
SetFocus
MoveWindow
MapWindowPoints
SystemParametersInfoW
ShowWindow
EnableWindow
SetWindowTextW
GetWindowRect
GetDlgItem
MessageBoxW
SendMessageW
CallWindowProcW
SetWindowLongW
GetParent
PostMessageW
KillTimer
SetTimer
advapi32
RegQueryValueExW
RegCloseKey
CryptReleaseContext
GetLengthSid
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptAcquireContextA
LookupAccountNameW
RegOpenKeyExW
GetUserNameW
LogonUserW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
gdi32
DeleteObject
ole32
OleUninitialize
CoCreateInstance
rpcrt4
RpcBindingFree
RpcStringFreeW
NdrClientCall2
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcEpResolveBinding
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ