Static task
static1
Behavioral task
behavioral1
Sample
52aaf311eb05acf48ee1d9e83a39a6a5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52aaf311eb05acf48ee1d9e83a39a6a5.dll
Resource
win10v2004-20231215-en
General
-
Target
52aaf311eb05acf48ee1d9e83a39a6a5
-
Size
316KB
-
MD5
52aaf311eb05acf48ee1d9e83a39a6a5
-
SHA1
ab7251e417062ae8ace17ed0a7aceef5e18d84f9
-
SHA256
d0455dbf5eef91027a4ae5cbbc78dbd2b52f292b688e8c682c5db307b592d925
-
SHA512
e5b7109f0a6e97306bcbb2accb79e2de3ac300158775497dbb3994583ebef2ae653d043e83293be3e3b0fc19a0e3fc784f3933b10dd823a03730d2f377e437e7
-
SSDEEP
3072:gvT8r8uqRLEhMf9tIlzDQ7BUHk204lqwLaBNtT1TJH4+eZ4oBU2iGHEnCHoTWD9L:gvDRLIcLIsNRo+2idgbuM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52aaf311eb05acf48ee1d9e83a39a6a5
Files
-
52aaf311eb05acf48ee1d9e83a39a6a5.dll windows:4 windows x86 arch:x86
a935499f8776d632ba446af874b73812
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
WaitForSingleObject
CreateEventW
GetTempFileNameW
GetWindowsDirectoryW
FindClose
FindFirstFileW
CopyFileW
SetEvent
OpenEventW
CreateProcessW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetTempPathW
SetFilePointer
GetTickCount
GetFileAttributesW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetModuleFileNameW
CreateFileW
WriteFile
CloseHandle
lstrcpynW
CreateThread
SystemTimeToFileTime
GetSystemTime
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
LoadLibraryA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
user32
GetWindow
IsWindowVisible
GetWindowTextW
LoadIconW
GetDesktopWindow
MessageBoxW
SetForegroundWindow
SetFocus
EnumWindows
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
ShellExecuteW
ole32
CoInitialize
CoCreateGuid
CoUninitialize
CoInitializeEx
StringFromGUID2
CoCreateInstance
shlwapi
SHDeleteKeyW
wininet
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetReadFile
HttpQueryInfoW
InternetCheckConnectionW
InternetAttemptConnect
Sections
.text Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ