Static task
static1
Behavioral task
behavioral1
Sample
4779075cf5001f3a21ff3f74cda922f3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4779075cf5001f3a21ff3f74cda922f3.dll
Resource
win10v2004-20231215-en
General
-
Target
4779075cf5001f3a21ff3f74cda922f3
-
Size
276KB
-
MD5
4779075cf5001f3a21ff3f74cda922f3
-
SHA1
359c2ed9a9d382bffd59cb668ef817a5c52879db
-
SHA256
5913c0fc2e2617bc76f540396928592449d37b52af986a6b58ff723b3b0abfba
-
SHA512
f0d5d704c57652faf656b172cc822d84d6b116515a9d14e77548f7073fd90bba90f379c75abd28088229c46f5242096528b5a0e09effaa8f4fa2caa312e5eff7
-
SSDEEP
6144:eGBFRKYLxLBdTLOFYiVVSwBEco3/k3iv8UI:bpFFSF1SwPoM3i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4779075cf5001f3a21ff3f74cda922f3
Files
-
4779075cf5001f3a21ff3f74cda922f3.dll windows:4 windows x86 arch:x86
fcbf99c65f4a7e8d4e034671034e5ccd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
imagehlp
CheckSumMappedFile
psapi
GetModuleInformation
GetProcessImageFileNameA
kernel32
GetOEMCP
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
HeapReAlloc
GetCommandLineA
ExitProcess
GetCPInfo
RaiseException
WriteConsoleW
GetFileType
GetStdHandle
HeapSize
Sleep
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LoadLibraryW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
FindResourceA
LoadResource
LockResource
SizeofResource
VirtualQuery
Process32First
Process32Next
CreateMutexA
CreateSemaphoreA
ReleaseSemaphore
GetCurrentProcessId
LocalAlloc
IsBadReadPtr
CreateToolhelp32Snapshot
Thread32First
OpenThread
SuspendThread
Thread32Next
GetVersionExA
OpenProcess
WaitForSingleObject
TerminateProcess
GetCurrentProcess
VirtualProtect
WritePrivateProfileStringA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileSize
GetModuleFileNameA
HeapFree
GetProcessHeap
HeapAlloc
GetTickCount
VirtualProtectEx
GetModuleHandleA
GetProcAddress
ResumeThread
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetLastError
MultiByteToWideChar
InterlockedExchange
GetVersion
lstrlenA
CompareStringA
WideCharToMultiByte
GetCurrentThreadId
RtlUnwind
user32
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
ShowWindow
SetWindowTextA
UnregisterClassA
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
IsWindowEnabled
GetMenuState
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
ReleaseDC
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
EnableWindow
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
GetSysColorBrush
LoadCursorA
GetPropA
SendMessageA
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
EnumWindows
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetClassNameA
GetDlgItem
GetKeyState
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetBkColor
SetTextColor
GetClipBox
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
CreateBitmap
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
SetSecurityInfo
FreeSid
shell32
SHFileOperationA
shlwapi
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ