Static task
static1
Behavioral task
behavioral1
Sample
54777acda413414fec4a77acf36e1709.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54777acda413414fec4a77acf36e1709.dll
Resource
win10v2004-20231215-en
General
-
Target
54777acda413414fec4a77acf36e1709
-
Size
184KB
-
MD5
54777acda413414fec4a77acf36e1709
-
SHA1
0e3db766221b815efa45c99726c2becd8db7511b
-
SHA256
f62df476eb4b605af68df74664ae7fef4bc08a968a8913b00dc7379cdbb5b790
-
SHA512
ed26d1d5cc9a9e79592d6c025f7db3394dee7fd23b797228cc27ac3cfab8f33c689ff674bd890fa454c955b376ec487543aa7cf3eeef71ca85ab28d47a6a1f22
-
SSDEEP
3072:QmZRt0DAJywqTFRyty8sMpTq9faIeyj6zQ99ZEvKWyPkoDcUn3qqtTFem:HRuDAJhqTAZMa366zqPDYU68FF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54777acda413414fec4a77acf36e1709
Files
-
54777acda413414fec4a77acf36e1709.dll windows:4 windows x86 arch:x86
31d3ebc3204b7f17bced60a64abe6762
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
CreateFileW
CloseHandle
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesW
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
LoadLibraryW
GetProcAddress
FindClose
ReadFile
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ