pgxavl
Static task
static1
Behavioral task
behavioral1
Sample
70ea6dd580457d144c590ef10b685b0c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
70ea6dd580457d144c590ef10b685b0c.dll
Resource
win10v2004-20231215-en
General
-
Target
70ea6dd580457d144c590ef10b685b0c
-
Size
156KB
-
MD5
70ea6dd580457d144c590ef10b685b0c
-
SHA1
339da7475311fec4b82eaaa04beaa768976e969f
-
SHA256
03b567287eeab2da057ce6783cc5154bec87d1abb2617fbaa139cfd1f2a2efc9
-
SHA512
139facf67857a19be8bb1eb3b93ce6c84d3d828b08a6f41d5abc14c156c7017bed93943b4992fdf135f6e44c331d66fcd46f685d1c99017512d014a0925d9132
-
SSDEEP
3072:CcwfekI0iJc23GIhTjE+7IJ5EyrHe53U5ezUNQJX:CDw0522a7Touw+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70ea6dd580457d144c590ef10b685b0c
Files
-
70ea6dd580457d144c590ef10b685b0c.dll windows:4 windows x86 arch:x86
fd196f4c68394952c74856e0c35cf9f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetShortPathNameA
CompareStringA
lstrlenA
lstrcmpA
GetVersionExA
GetModuleFileNameA
GetProcessHeap
SetFileAttributesA
MoveFileA
GetSystemTimeAsFileTime
GetFileTime
GetTempPathA
CloseHandle
GetFileSize
LocalFree
FormatMessageA
GetLastError
CreateFileA
InterlockedExchange
Sleep
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
HeapFree
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MapViewOfFile
MultiByteToWideChar
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetVersionExW
SetLastError
LoadResource
FindResourceExW
LoadLibraryExW
FreeLibrary
CreateFileMappingW
CreateFileW
GetLocaleInfoW
GetTickCount
HeapAlloc
ole32
CoUninitialize
CoCreateInstance
CoInitialize
user32
MessageBoxA
LoadStringA
advapi32
IsValidAcl
msvcrt
wcslen
malloc
fclose
memcpy
free
wcsncmp
memset
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ