Static task
static1
Behavioral task
behavioral1
Sample
7c8b856b599880d30840a7e22378cc02.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c8b856b599880d30840a7e22378cc02.dll
Resource
win10v2004-20231222-en
General
-
Target
7c8b856b599880d30840a7e22378cc02
-
Size
184KB
-
MD5
7c8b856b599880d30840a7e22378cc02
-
SHA1
0c7bf7de5dc1b14e75d4153d648870d0a67c4877
-
SHA256
f2ea08e54856c4023d9cd6372ed770550c36b71488a5999043739f085b7cb624
-
SHA512
bba8fcbf569ea442ac334040f7a98cb10bd3547920f6874bff5a2299507d162759f0139cb81249b268bf1ddbfc1493c3483efb37490aec935d3df370e9897e84
-
SSDEEP
3072:GU3wH+eyer2h7FI7PN+7Wl/kwBX/8FAPqaGTrItH/rM/:GU/uSW7dATrCI/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c8b856b599880d30840a7e22378cc02
Files
-
7c8b856b599880d30840a7e22378cc02.dll windows:4 windows x86 arch:x86
644373d2eba56dc8e844ba703b5f5871
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
Sleep
GetTickCount
CreateEventW
WaitForSingleObject
SetEvent
CreateThread
GetProcAddress
TerminateProcess
SetLastError
GetCurrentProcessId
GetLastError
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
CreateProcessW
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetTempFileNameW
MultiByteToWideChar
GetSystemTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoInitializeEx
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoInitialize
CoUninitialize
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetAttemptConnect
shlwapi
SHDeleteKeyW
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ