Static task
static1
Behavioral task
behavioral1
Sample
573984362c6d49d35e512904deacd0d3.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
573984362c6d49d35e512904deacd0d3.dll
Resource
win10v2004-20231222-en
General
-
Target
573984362c6d49d35e512904deacd0d3
-
Size
36KB
-
MD5
573984362c6d49d35e512904deacd0d3
-
SHA1
e42f05f449bb886fef0e1536c53fbe3703931d2d
-
SHA256
79132d9c9fd5877ec7dcee8e35cdb56fc626f9336d63f9e2332daeb0a7095e55
-
SHA512
8a4842877c450dbeff2f5d27a702c6e6d2fcac3d85a90bf9077f4405e19d5f9806be9d806db0424beea194039c789a6382304db817c955bd5645f63df05d05da
-
SSDEEP
384:GYopeQ9rHfPTjN9og2X3fG8u6gy7/Ku9u6kBmw+6uBBQARQk+oGtd1m4gtr:GY1wv8rX3fRgml+mwKBBQARQk+ntddw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 573984362c6d49d35e512904deacd0d3
Files
-
573984362c6d49d35e512904deacd0d3.dll windows:4 windows x86 arch:x86
f7d9a1d0792f9c7158202c2e55a28c0d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
strstr
RtlZeroMemory
RtlUnwind
memcpy
memcmp
strlen
ws2_32
closesocket
gethostname
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
MapViewOfFile
MoveFileExA
ReadFile
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WideCharToMultiByte
WriteFile
lstrcpynA
IsBadReadPtr
LoadLibraryA
user32
wsprintfA
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
PostMessageA
CallNextHookEx
FindWindowA
KillTimer
RegisterWindowMessageA
SendMessageA
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ