c:\Check\Mountain\got_Sent\Touch-Every\insect.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8bc41922aa2635dbce28dbedf8c7c332.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bc41922aa2635dbce28dbedf8c7c332.dll
Resource
win10v2004-20231215-en
General
-
Target
8bc41922aa2635dbce28dbedf8c7c332
-
Size
348KB
-
MD5
8bc41922aa2635dbce28dbedf8c7c332
-
SHA1
8f08e4b153a817acde40c1e32d1b5343ece8cc0b
-
SHA256
98a4c62581108b0c40bb18ff399c661a4f3e9678b680b03e36bc42afd40281e8
-
SHA512
ec5ec0a6736982d7bf41e50c8764cfb363ac8f54244961fd1ba94db69442aaa9dd0ce67b31a094574506741acd006938f585e70a7e1f175efd2c7944942ff7b7
-
SSDEEP
6144:h3hEPz1JqXgnzmRPIwDLjKvKfF/AOtJ4pwafZ8FGW:huzzwJDTF/HJ2waWFGW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bc41922aa2635dbce28dbedf8c7c332
Files
-
8bc41922aa2635dbce28dbedf8c7c332.dll windows:6 windows x86 arch:x86
58c8eaad4301430a35e0413d341f1411
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
CreateFileW
FlushFileBuffers
SetConsoleOutputCP
LocalFree
VirtualProtectEx
GetCurrentDirectoryW
TlsAlloc
CreateEventW
GetSystemDirectoryW
LocalAlloc
GetModuleFileNameW
RemoveDirectoryW
GetConsoleMode
GetConsoleCP
WriteFile
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
WriteConsoleW
ole32
CoUninitialize
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
advapi32
CreateServiceW
RegCreateKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
ControlService
CloseServiceHandle
RegSetValueExW
DeleteService
RegisterServiceCtrlHandlerW
AllocateAndInitializeSid
FreeSid
SetSecurityDescriptorDacl
SetServiceStatus
RegQueryValueExW
RegEnumKeyW
GetTokenInformation
RegCloseKey
InitializeSecurityDescriptor
SetEntriesInAclW
RegOpenKeyExW
OpenProcessToken
StartServiceCtrlDispatcherW
rasapi32
RasEnumConnectionsW
RasGetConnectStatusW
Exports
Exports
Appearwall
Boxmake
Cry
Meantthird
Sections
.text Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ