Static task
static1
Behavioral task
behavioral1
Sample
595920b53ee962d71a16b9be85e0be3f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
595920b53ee962d71a16b9be85e0be3f.dll
Resource
win10v2004-20231215-en
General
-
Target
595920b53ee962d71a16b9be85e0be3f
-
Size
196KB
-
MD5
595920b53ee962d71a16b9be85e0be3f
-
SHA1
6954465ff7fc171094069b0e6c4cadd08a971478
-
SHA256
890b5335695ae1b49247c42abd5fa131cf00c4c5b0356a51594175f384856955
-
SHA512
594b0211f9382a55f68ef3fd290ccdb71d4f4f68a6b0dc61500108bd7ed39218046e50fc1532ec2cb40a8dc76861f4bbd5e3c8d0fad4c9c4ae5e10cd0423a770
-
SSDEEP
3072:WqQOwB9gRp99kaMQeuHYgw+k5d2zhqfV4d9OKZ7a1w8ra9ARKrDz8tnJtLZUPqf:xQ1OFMQXHYghqgL7EpeYKwf2qf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 595920b53ee962d71a16b9be85e0be3f
Files
-
595920b53ee962d71a16b9be85e0be3f.dll windows:4 windows x86 arch:x86
f6bf3559970a93c01518af19d2d4c2b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
SetFilePointer
GetLastError
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
Sleep
LoadLibraryW
GetProcAddress
FindClose
SystemTimeToFileTime
FindFirstFileW
SetEndOfFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
LoadLibraryA
InitializeCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
advapi32
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
ole32
CoInitialize
shlwapi
SHDeleteKeyW
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ