Static task
static1
Behavioral task
behavioral1
Sample
666c9f71920b3eb580fe7d3491a2b009.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
666c9f71920b3eb580fe7d3491a2b009.dll
Resource
win10v2004-20231215-en
General
-
Target
666c9f71920b3eb580fe7d3491a2b009
-
Size
104KB
-
MD5
666c9f71920b3eb580fe7d3491a2b009
-
SHA1
41735ec15675f4ee9c7e631904bdb404be93fb37
-
SHA256
a1eac260fa98cd3e182c1f2144175926a955ff67f6cd5758543df56d06b81901
-
SHA512
f78e8b6a78b1a41d084098f29f6984a989ff82450c14cda437f152f95e7c44f75a2ed1f595c21332dcf9ff31e9e029c3ce155f6a0ccf29ac34c6851eccdb68f0
-
SSDEEP
1536:9gJMWXTvUb/Wj+ijFE3KZkCtr+HC444dIOOFnToIfJiBUju:I1jvU7WjlKKkECHC444XOtTBfJiBUju
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 666c9f71920b3eb580fe7d3491a2b009
Files
-
666c9f71920b3eb580fe7d3491a2b009.dll windows:4 windows x86 arch:x86
8be29a72d4fcfb3c0497e112cfb58548
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysStringLen
SysAllocString
SysFreeString
shlwapi
PathAddBackslashA
PathAppendA
user32
wsprintfA
wininet
InternetGetConnectedState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
InternetErrorDlg
InternetSetFilePointer
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
ws2_32
WSACleanup
WSAStartup
closesocket
ntohs
recv
select
htons
socket
sendto
gethostbyname
inet_addr
ntohl
gethostname
connect
msvcrt
_adjust_fdiv
_initterm
memset
memcpy
atoi
fseek
fwrite
realloc
fread
_ftol
tolower
isxdigit
toupper
isdigit
sprintf
fopen
strstr
strchr
fgets
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
malloc
rand
_strlwr
free
_strcmpi
_stricmp
_strdup
_filelength
_fileno
fclose
kernel32
GetFileSize
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
GetVersion
CreateProcessA
GetPrivateProfileStringA
GetVolumeInformationA
CreateToolhelp32Snapshot
Process32First
GetPriorityClass
Process32Next
OpenProcess
CreateRemoteThread
GetCurrentProcessId
SetFileAttributesA
IsBadReadPtr
VirtualProtect
VirtualProtectEx
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
VirtualAllocEx
GetModuleHandleA
lstrcpynA
WriteFile
GetFileAttributesA
GetTickCount
GetTempFileNameA
GetTempPathA
SetFilePointer
GetLogicalDriveStringsA
GetDriveTypeA
lstrcpyA
lstrcatA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
ReadFile
SetThreadPriority
GetWindowsDirectoryA
GetEnvironmentVariableA
EnterCriticalSection
LeaveCriticalSection
SetEvent
lstrlenA
WaitForSingleObject
CreateEventA
InitializeCriticalSection
GetSystemDirectoryA
Sleep
WaitForMultipleObjects
DeleteCriticalSection
LoadLibraryA
CreateFileA
DeleteFileA
MoveFileA
MoveFileExA
FreeLibraryAndExitThread
GetModuleFileNameA
CreateMutexA
GetLastError
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateThread
CloseHandle
DisableThreadLibraryCalls
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ