Static task
static1
Behavioral task
behavioral1
Sample
5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79.dll
Resource
win10v2004-20231215-en
General
-
Target
5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79
-
Size
300KB
-
MD5
1d64f6ee2fe79cd781adabda6597f674
-
SHA1
b0ef2f26f71d83631409601655b5458f19f3df1b
-
SHA256
5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79
-
SHA512
44eb80aaa567169a91698b136fc02d2298c4934ffbc324efde963b355111d76296a438810fa684705491e34375d2943f7f01c201f04f4b03e0b7edcc19cc451e
-
SSDEEP
6144:/8gQ6MlmIqsW3yNTrARel9e3kkk9eijAkZKLlQiVyHVAOHZOXTGh4:UgH3UrT9e369dhZeVedZOjGh4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79
Files
-
5ba8399ec73565e8aa2ef8ac992b2c818936b827586ba344ae17f30924fcff79.dll windows:6 windows x86 arch:x86
efcae2dca98e6915a736fc3a30bab67c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ole32
CoUninitialize
CoInitialize
winhttp
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpOpen
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpSendRequest
WinHttpConnect
WinHttpCrackUrl
advapi32
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RevertToSelf
AccessCheck
SetSecurityDescriptorOwner
AllocateAndInitializeSid
ImpersonateSelf
IsValidSecurityDescriptor
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
AddAccessAllowedAce
OpenThreadToken
netapi32
Netbios
kernel32
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
IsBadReadPtr
IsValidCodePage
FindNextFileW
GetSystemFirmwareTable
VirtualProtect
HeapFree
SetLastError
VirtualFree
GetCurrentProcess
WriteFile
VirtualAlloc
CreateMutexA
WaitForSingleObject
LocalAlloc
CreateFileW
UnmapViewOfFile
MultiByteToWideChar
Sleep
GetLastError
OpenMutexA
GetCurrentThread
LoadLibraryA
CloseHandle
GetNativeSystemInfo
CreateThread
HeapAlloc
GetProcAddress
CreateFileMappingA
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
WriteConsoleW
MapViewOfFile
GetTickCount
GetComputerNameA
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
FindFirstFileExW
RtlUnwind
RaiseException
InterlockedFlushSList
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapReAlloc
GetStdHandle
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindClose
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ