_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
89ba03034989d2951426d0f8d0d327c4.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89ba03034989d2951426d0f8d0d327c4.dll
Resource
win10v2004-20231222-en
General
-
Target
89ba03034989d2951426d0f8d0d327c4
-
Size
22KB
-
MD5
89ba03034989d2951426d0f8d0d327c4
-
SHA1
a7bc083bf9333971749ed1ad090f8b7ec20ae1d1
-
SHA256
f3310d07efde57114bdd1c7645c053bb0c0a544d5bb1060fca7c1fcce76f19a3
-
SHA512
8b2a21bc75c30825410849c2ecc6d2e7c899164f122877a109f7dcfe95ec877f5f3bdb096283a4edf81cddbd4bc58aee9bf3610594417cb64a73dfc760e08568
-
SSDEEP
384:0bT4VE+DKgpsHULA3lZeqi1BY2tewQeYIkHrmip9+VmWF5f:0uEapsHQA3s26JQeZMqi6E85f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89ba03034989d2951426d0f8d0d327c4
Files
-
89ba03034989d2951426d0f8d0d327c4.dll windows:4 windows x86 arch:x86
0fc1d702d17f3216b7a12c7150a1a948
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
SetEvent
WaitForSingleObject
CreateEventA
CreateMutexA
CreateThread
LoadLibraryA
GetModuleFileNameA
DisableThreadLibraryCalls
VirtualFree
VirtualProtect
VirtualAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
Module32First
VirtualQuery
GetSystemInfo
GetCurrentProcess
WinExec
WriteFile
CreateFileA
GetTempFileNameA
GetShortPathNameA
GetTempPathA
InterlockedPopEntrySList
InterlockedPushEntrySList
InitializeSListHead
CreateFileMappingA
FreeLibrary
ResetEvent
ReleaseMutex
GetCurrentThread
SetThreadPriority
FreeLibraryAndExitThread
MapViewOfFile
UnmapViewOfFile
CloseHandle
Module32Next
user32
SetWindowsHookExA
UnhookWindowsHookEx
ShowWindow
UpdateWindow
CreateWindowExA
RegisterClassA
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
DeleteUrlCacheEntry
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
urlmon
URLDownloadToFileA
ws2_32
setsockopt
WSACleanup
closesocket
msvcrt
_snprintf
strlen
_ismbcprint
_mbscmp
_mbsupr
time
memset
__CxxFrameHandler
_memicmp
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
strcat
_ismbcspace
_mbsinc
memmove
abs
memcmp
sprintf
strcpy
_mbsstr
_mbsicmp
_mbsrchr
_local_unwind2
memcpy
??2@YAPAXI@Z
_except_handler3
_mbsnbcpy
Exports
Exports
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ