Static task
static1
Behavioral task
behavioral1
Sample
66f84b184d6cda4fda4627c6a1188884.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66f84b184d6cda4fda4627c6a1188884.dll
Resource
win10v2004-20231215-en
General
-
Target
66f84b184d6cda4fda4627c6a1188884
-
Size
233KB
-
MD5
66f84b184d6cda4fda4627c6a1188884
-
SHA1
cb5ae2864ffc5c6ae466654ee4da23be1cb9ee01
-
SHA256
f0201d50f7b352c90c7f0092f45e87fed31862c171bf63464749c6b7feb3307a
-
SHA512
eada591d7daa6feaa120c790fdd37d44b2d266886275a99d2288ec5d57c3a0cd15cbef061c833915fa0f989c89afe80f854fcc21c630445a7f1ac82a4dc26b57
-
SSDEEP
6144:AX3/gc14bnDLiqx4HYkwoqjEgCCdGMUvvbC5oL:AX3/d14bnDeq0Y9VEgFd2nbC5oL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66f84b184d6cda4fda4627c6a1188884
Files
-
66f84b184d6cda4fda4627c6a1188884.dll windows:4 windows x86 arch:x86
5f43adca85b2d6bfe736cf146748e6f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetDiskFreeSpaceA
Sleep
lstrlenW
FindClose
GetSystemDefaultLangID
GetModuleHandleA
GetOEMCP
GetACP
VirtualQuery
GetCurrentThread
SetThreadLocale
IsBadReadPtr
GetStartupInfoA
LocalReAlloc
SetErrorMode
WideCharToMultiByte
HeapDestroy
WaitForSingleObject
GetProcAddress
WriteFile
ExitThread
LoadLibraryA
SizeofResource
GetStringTypeW
GetCommandLineA
EnterCriticalSection
ExitProcess
GetProcessHeap
GetCurrentThreadId
GetCommandLineW
DeleteFileA
LocalAlloc
lstrlenA
FindResourceA
GetVersionExA
GetModuleHandleW
GlobalFindAtomA
lstrcmpA
GetLastError
CreateThread
GetFileSize
VirtualAllocEx
GlobalDeleteAtom
IsBadHugeReadPtr
GlobalAddAtomA
GetTickCount
RaiseException
SetEvent
GetStringTypeA
GetLocaleInfoA
LockResource
SetLastError
GetUserDefaultLCID
EnumCalendarInfoA
HeapAlloc
lstrcatA
GetModuleFileNameA
ResetEvent
LoadLibraryExA
lstrcpynA
FormatMessageA
GlobalAlloc
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
oleaut32
SysFreeString
SafeArrayCreate
shlwapi
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteValueA
SHQueryValueExA
PathFileExistsA
SHStrDupA
msvcrt
atol
sin
memset
sqrt
fabs
user32
TrackPopupMenu
SetForegroundWindow
SetTimer
SetWindowLongA
SetParent
SetWindowsHookExA
SetClipboardData
SetCapture
ShowScrollBar
SetScrollRange
SetPropA
SetWindowPlacement
TranslateMessage
TranslateMDISysAccel
SetMenu
SetWindowPos
SetClassLongA
SetScrollInfo
SystemParametersInfoA
SetRect
SetMenuItemInfoA
SetCursor
SetWindowLongW
SetFocus
ShowWindow
SetWindowTextA
UnregisterClassA
SetScrollPos
ShowOwnedPopups
UnhookWindowsHookEx
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 162KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 1024B - Virtual size: 853B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ