Static task
static1
Behavioral task
behavioral1
Sample
73a0e4fae96ef864de45f653a25d24a6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73a0e4fae96ef864de45f653a25d24a6.dll
Resource
win10v2004-20231215-en
General
-
Target
73a0e4fae96ef864de45f653a25d24a6
-
Size
127KB
-
MD5
73a0e4fae96ef864de45f653a25d24a6
-
SHA1
c4dac59cdd9eee58bcd6e59b8d98de93eb10cf36
-
SHA256
7fb87454144a37a67649843e9040943c7c770edc9220c444c8f97432155a1fe1
-
SHA512
ea5ba5f5a197c11125fdd208f4fbde5cdc55a66ed64242920fdc0b01c5d8e85ed94fe051fb7b56ef82228be279873e534118903e282fe744e9abc2cf60c25a00
-
SSDEEP
1536:ruPSFe3KPGV1OY/f/7SUTmn5Vz1OojvURRp0kV3GgkqG2xm0QcVDN4:ruPSAN36nHzUIvYQkV3/LGkQcVDN4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73a0e4fae96ef864de45f653a25d24a6
Files
-
73a0e4fae96ef864de45f653a25d24a6.dll windows:4 windows x86 arch:x86
fb4f4cdf7ce0b3d9c4c11735533a9184
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
_aullrem
RtlDestroyHandleTable
NtSetSystemEnvironmentValue
RtlIsValidHandle
RtlSetDaclSecurityDescriptor
NtMakeTemporaryObject
RtlOemToUnicodeN
RtlDetermineDosPathNameType_U
RtlSetUserFlagsHeap
RtlSetAllBits
RtlGetNtGlobalFlags
NtRequestDeviceWakeup
RtlIsNameLegalDOS8Dot3
RtlCompareUnicodeString
NtOpenIoCompletion
RtlLargeIntegerSubtract
_allrem
RtlSetCurrentEnvironment
NtSetQuotaInformationFile
NtLoadKey2
_strnicmp
NtLockFile
iswxdigit
_ltoa
NtUnlockVirtualMemory
KiUserExceptionDispatcher
RtlCompareMemory
RtlCreateUserProcess
RtlInitializeHandleTable
NtSetDefaultUILanguage
RtlInt64ToUnicodeString
kernel32
WritePrivateProfileSectionW
GetConsoleAliasesLengthA
ReadProcessMemory
IsDBCSLeadByte
GetThreadPriority
SetFileAttributesA
GetConsoleCommandHistoryLengthA
GetSystemPowerStatus
WaitForDebugEvent
GetStringTypeW
LocalCompact
SetSystemTime
ExitProcess
SetConsoleScreenBufferSize
GetVDMCurrentDirectories
GetCPInfo
IsBadStringPtrW
SearchPathA
VirtualFreeEx
DuplicateConsoleHandle
GetDiskFreeSpaceExA
GetFileTime
SetEndOfFile
VirtualAlloc
lstrcpynA
SetFileTime
lstrcmp
gdi32
GetTextColor
GetCharacterPlacementW
SaveDC
SetICMProfileA
GetEnhMetaFileDescriptionA
ResetDCA
CopyEnhMetaFileA
GetRgnBox
GetTextCharset
CreateEnhMetaFileA
GdiGetBatchLimit
SetDIBits
CloseFigure
CreateRectRgnIndirect
Rectangle
SetTextCharacterExtra
ExtCreatePen
CreateMetaFileA
DeleteEnhMetaFile
ole32
CoFreeAllLibraries
CoSuspendClassObjects
StgOpenStorage
OleRegEnumVerbs
HENHMETAFILE_UserFree
IsValidPtrOut
OleGetIconOfClass
CreateBindCtx
CLIPFORMAT_UserFree
CoImpersonateClient
CoSetState
HBITMAP_UserUnmarshal
Sections
.text Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ