Static task
static1
Behavioral task
behavioral1
Sample
4f520cfe5d6116c1e10328ccdcfaf0cf.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f520cfe5d6116c1e10328ccdcfaf0cf.dll
Resource
win10v2004-20231215-en
General
-
Target
4f520cfe5d6116c1e10328ccdcfaf0cf
-
Size
27KB
-
MD5
4f520cfe5d6116c1e10328ccdcfaf0cf
-
SHA1
1c7238010a8b0fffe8a728162db3703ac36f6203
-
SHA256
672f8df85cf9bb2da6eeb0f0b47d5867fc7265fc07a01c52d312f19d805e924a
-
SHA512
9b59beb35a892e4e560cfe8e245c549e0c2f43dd7d34b33467973fbbf04510f81b2ea2954c6dc532319b14e58267e2c12db1eaf36ac97729e9fcdae78a5fef0d
-
SSDEEP
384:rf+Omu+Xe7iuhd0Jt+XcCCI04YIo1HHsTT+sM:z/mqp/0Jtuc9I0WTo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f520cfe5d6116c1e10328ccdcfaf0cf
Files
-
4f520cfe5d6116c1e10328ccdcfaf0cf.dll windows:5 windows x64 arch:x64
d198609123f2ede2fd1b29016f5034aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemDirectoryA
GetLastError
GetProcAddress
Process32Next
GetModuleHandleA
TerminateProcess
ReleaseMutex
CreateThread
GetExitCodeProcess
OpenProcess
HeapAlloc
GetSystemWow64DirectoryA
WaitForSingleObject
Process32First
CloseHandle
OutputDebugStringA
CreateMutexA
Sleep
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapFree
CreateToolhelp32Snapshot
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
advapi32
CloseServiceHandle
OpenServiceA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
ControlService
OpenSCManagerA
RegOpenKeyExA
StartServiceA
RegCloseKey
shell32
ShellExecuteA
iphlpapi
GetIpForwardTable
ws2_32
connect
inet_addr
WSASend
WSAGetLastError
htons
setsockopt
WSAGetOverlappedResult
WSACloseEvent
closesocket
WSAResetEvent
WSASocketA
WSAWaitForMultipleEvents
inet_ntoa
WSAStartup
WSACleanup
WSACreateEvent
recv
msvcr90
memset
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
__crt_debugger_hook
sprintf
strcpy_s
strncpy
rand
srand
_time64
atoi
_encode_pointer
_malloc_crt
_initterm
_initterm_e
free
_encoded_null
_decode_pointer
_amsg_exit
__C_specific_handler
__CppXcptFilter
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ