Static task
static1
Behavioral task
behavioral1
Sample
59b914923386513b1bb2828d37721108.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59b914923386513b1bb2828d37721108.dll
Resource
win10v2004-20231215-en
General
-
Target
59b914923386513b1bb2828d37721108
-
Size
76KB
-
MD5
59b914923386513b1bb2828d37721108
-
SHA1
c9707fc247dec5bc995771c0601e48395dfaddc6
-
SHA256
48df1d125e6062d8c02dab50e159c4389f80afdc7a327419c6efece8a8db86b8
-
SHA512
48dbf8f37ad21aab8e4fff94364d540350e5aa7c2c711858aaeffe554be6d23d21b67094a845bb61ff2e2a20d2f39758c117ee17890e1a5988fdcdba8bb758c7
-
SSDEEP
1536:zr7D/R6WtGdf6NLhxdzUyMDLI3NFnToIf6HTR3Yy:f7jnGUL7dzUyoLI9tTBfoTR3Yy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59b914923386513b1bb2828d37721108
Files
-
59b914923386513b1bb2828d37721108.dll windows:4 windows x86 arch:x86
f7b824bdc1f89763a2dee17f68c0aa9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpynA
MoveFileExA
GetModuleFileNameA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
CreateThread
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
lstrcpyA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
lstrlenA
SetLastError
WinExec
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
user32
keybd_event
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
GetDesktopWindow
wsprintfA
gdi32
CreateCompatibleBitmap
BitBlt
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_ftol
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
wcstombs
_strlwr
??3@YAXPAX@Z
strstr
strcspn
atoi
_except_handler3
_CxxThrowException
__CxxFrameHandler
strncat
sprintf
strncpy
??2@YAPAXI@Z
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
ws2_32
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
WSAIoctl
Sections
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ