Static task
static1
Behavioral task
behavioral1
Sample
2cc3aae2471c8ef792f276dcf832e314936a02a23e08b0bda82d09cd110e572c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cc3aae2471c8ef792f276dcf832e314936a02a23e08b0bda82d09cd110e572c.dll
Resource
win10v2004-20231215-en
General
-
Target
3aff96583899699964dc767bae529c9e.bin
-
Size
60KB
-
MD5
9103981bfccf704472c72f15bbe38a60
-
SHA1
41c9d138494570d8738d25867799ec59d2ebd387
-
SHA256
b72ed7ec3a7aa188099d26f32c063016abab36180f05335337f6ea81db5351a8
-
SHA512
e269b90bc5e7de77d72b08242f3bf647a13360c6bea5a1c1be6b4d23215c72f8538868bfcd84620be6d21fcd672443bdf0b80ee15c7b8e58e5fdbd82cd4a48d1
-
SSDEEP
1536:7zRGV1LWtpGAsw5wyjUHjI/9RKY46Yj/h0Hn:PRG+GA359IMVRNYjiHn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2cc3aae2471c8ef792f276dcf832e314936a02a23e08b0bda82d09cd110e572c.dll
Files
-
3aff96583899699964dc767bae529c9e.bin.zip
Password: infected
-
2cc3aae2471c8ef792f276dcf832e314936a02a23e08b0bda82d09cd110e572c.dll.dll windows:4 windows x86 arch:x86
Password: infected
092ec812e52bc82d25a6b0905da4233c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
VirtualProtect
GetProcAddress
LoadLibraryA
OpenMutexA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
user32
GetForegroundWindow
ShowCursor
GetWindowRect
MessageBoxA
SetWindowTextA
GetWindowLongA
SetWindowLongA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ