Static task
static1
Behavioral task
behavioral1
Sample
5b4ec50a3e556ff0e049f6b17f81a11f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b4ec50a3e556ff0e049f6b17f81a11f.dll
Resource
win10v2004-20231215-en
General
-
Target
5b4ec50a3e556ff0e049f6b17f81a11f
-
Size
104KB
-
MD5
5b4ec50a3e556ff0e049f6b17f81a11f
-
SHA1
09391688409d4ae29189a363d90a4f583fcdf586
-
SHA256
f2e36ad2daf20a39846949fca504302454e21404db0859f8db9df80e9bb760bd
-
SHA512
7f95922db9bbfc3e5e5be2924224f4f8bb442541b4cdcab99473589909c58aff6abf66311c9f13cd8ea31f2f800cb105d4494cd68a2996b0f38199925a9f51db
-
SSDEEP
3072:bOxEUonqdgDpyH8hdYKsJFHp1TJdw+NB4bFXtu:1qdbgdMT94bF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4ec50a3e556ff0e049f6b17f81a11f
Files
-
5b4ec50a3e556ff0e049f6b17f81a11f.dll windows:4 windows x86 arch:x86
7b2931c9c9894642b7ac6560ba5966da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenProcess
GetCurrentProcess
QueryPerformanceCounter
InitializeCriticalSection
SetCurrentDirectoryW
GetProcessId
GetEnvironmentVariableW
GetFileAttributesExW
CreateFileW
CloseHandle
RemoveDirectoryW
WriteFile
GetProcessTimes
GetComputerNameW
OutputDebugStringA
UnhandledExceptionFilter
FormatMessageW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
CompareStringW
InterlockedDecrement
ExpandEnvironmentStringsW
GetLastError
GetFullPathNameW
DisableThreadLibraryCalls
GetVersionExA
FreeLibrary
LocalFree
SetLastError
DeleteFileW
GetUserDefaultLCID
GetThreadLocale
Sleep
QueryPerformanceFrequency
FindFirstFileW
FindNextFileW
FindClose
GetTickCount
VirtualProtect
GlobalFree
GetCommandLineA
TerminateProcess
GlobalAlloc
user32
SetFocus
LoadStringW
GetScrollBarInfo
SetWindowLongW
GetParent
FindWindowW
FindWindowExW
SetForegroundWindow
DialogBoxParamW
EndDialog
GetWindowLongW
MessageBoxW
UpdateWindow
SetWindowTextW
GetDlgItemTextW
GetWindowThreadProcessId
KillTimer
SetDlgItemTextW
SendMessageW
PostMessageW
GetDlgItem
ShowScrollBar
advapi32
CloseServiceHandle
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
RegOpenKeyExW
gdi32
GetObjectType
GetCurrentObject
GetObjectA
GetDeviceCaps
ole32
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoCreateInstance
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
msvcr71
memset
_vsnwprintf
realloc
calloc
_wcsicmp
iswspace
_CxxThrowException
_onexit
wcschr
wcscspn
malloc
free
_errno
iswdigit
wcsftime
localtime
time
_wcsnicmp
_adjust_fdiv
__CppXcptFilter
__dllonexit
_wtol
_callnewh
_cexit
exit
_wcmdln
_initterm
_amsg_exit
_except_handler3
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ