Static task
static1
Behavioral task
behavioral1
Sample
90086cdb26ea418d34b595ee36943e1f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
90086cdb26ea418d34b595ee36943e1f.dll
Resource
win10v2004-20231215-en
General
-
Target
90086cdb26ea418d34b595ee36943e1f
-
Size
40KB
-
MD5
90086cdb26ea418d34b595ee36943e1f
-
SHA1
2a099fe9cf634a39774b601c7902ce9b4f8fd8be
-
SHA256
1a6a8fa07f09f39e9cbdb70ae570bf3eae6eaa464278e6b9ef1d34d378de077c
-
SHA512
8212db3c17163a3b37855099952018f0b06996031e1d5adb0a36d685a39241af71c0b823b5e098d01d72f86865cd1f978a5d76d4b0a3812d3865313ad7a9d1ba
-
SSDEEP
768:Ky6Ad3Rmv6i8wUqzX8NAm/YylP9s6Vprmit6Hgor:KRAD2YSs5/DlP9Pi26Hn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90086cdb26ea418d34b595ee36943e1f
Files
-
90086cdb26ea418d34b595ee36943e1f.dll windows:4 windows x86 arch:x86
522cdf438a99629fd54bcdbc617f0061
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalMemoryStatus
GetComputerNameA
CreateEventA
ResetEvent
TerminateThread
ExitThread
WinExec
FindNextFileA
GetLastError
FindClose
FindFirstFileA
SetCurrentDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetDriveTypeA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
VirtualProtectEx
GetModuleFileNameA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetSystemInfo
GetVersionExA
GetProcessHeap
LoadLibraryA
GetProcAddress
HeapAlloc
HeapFree
CreateThread
Sleep
SetConsoleCtrlHandler
GetModuleHandleA
GetLocalTime
SetFilePointer
GetFileSize
SetEvent
GetCurrentThreadId
GetFileTime
WriteFile
SetFileTime
CreateFileA
ReadFile
GetSystemDirectoryA
CopyFileA
CreateProcessA
WaitForSingleObject
CloseHandle
MoveFileA
DeleteFileA
user32
SetCursorPos
keybd_event
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
GetKeyState
PostThreadMessageA
GetKeyNameTextA
GetWindowTextA
GetForegroundWindow
CallNextHookEx
mouse_event
SetTimer
GetDC
ReleaseDC
KillTimer
CloseWindowStation
CloseDesktop
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
LineTo
MoveToEx
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
CreateDCA
GetDeviceCaps
DeleteObject
CreatePen
DeleteDC
advapi32
AdjustTokenPrivileges
ControlService
LookupPrivilegeValueA
OpenProcessToken
StartServiceA
ChangeServiceConfigA
OpenServiceA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
DeleteService
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
send
WSAStartup
gethostbyname
htons
WSASocketA
connect
closesocket
select
recv
urlmon
URLDownloadToFileA
msvcrt
??3@YAXPAX@Z
memcpy
memset
??2@YAPAXI@Z
atoi
strcpy
_strupr
strstr
strcat
strlen
__CxxFrameHandler
strcmp
memcmp
wcslen
free
_initterm
malloc
_adjust_fdiv
_itoa
_wcsupr
sprintf
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ