Static task
static1
Behavioral task
behavioral1
Sample
98126994fc7c745e075264dcb5f9b7db.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98126994fc7c745e075264dcb5f9b7db.dll
Resource
win10v2004-20231222-en
General
-
Target
98126994fc7c745e075264dcb5f9b7db
-
Size
133KB
-
MD5
98126994fc7c745e075264dcb5f9b7db
-
SHA1
4bf613f75802d0ced0f38a93d086bc368f50846b
-
SHA256
dd9342f98509e9dce2eb5f0ae40d5f0dde369225fdf3072857f0c86abf840143
-
SHA512
71aa6e6715c155f7d07fc4bff1cdd4db685db2d30ec1dd2d2f383b771408ee575430b99902d3e3ec2c65dba8051f6d9a90717b8bd1fb41d2bab1223ad4458d13
-
SSDEEP
3072:WQknHMd0OSKmE9alq3vwZQ559/Vq1/FZhEbkcYzKzcfxhxrx+:WnsqOSKmEsluvwZm8/FMkcYzE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98126994fc7c745e075264dcb5f9b7db
Files
-
98126994fc7c745e075264dcb5f9b7db.dll windows:4 windows x86 arch:x86
51f7fb1d4813a3d64b7d6c2de77d9bb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetProcessHeap
HeapAlloc
InterlockedIncrement
GetComputerNameW
InterlockedDecrement
DeviceIoControl
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LocalReAlloc
InitializeCriticalSection
CompareFileTime
SetEvent
GetSystemTimeAsFileTime
CreateEventW
GetModuleFileNameW
IsBadReadPtr
ReadFileEx
GetModuleHandleA
MulDiv
WaitForMultipleObjects
ResetEvent
GetModuleHandleW
CreateFileMappingW
MapViewOfFile
VirtualQuery
Sleep
DisableThreadLibraryCalls
CreateMutexW
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
CreateMailslotW
CreateFileW
WriteFile
ReadFile
CreateThread
InterlockedCompareExchange
InterlockedExchange
CloseHandle
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
lstrlenW
lstrlenA
LocalAlloc
LocalFree
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FreeResource
ReleaseMutex
TlsSetValue
TlsGetValue
GetCurrentThreadId
WaitForSingleObject
GetVersion
GetCommandLineA
GetTickCount
GetCurrentProcessId
VirtualProtect
user32
MapWindowPoints
GetWindowRect
SetFocus
GetPropW
CallWindowProcW
RemovePropW
GetWindowLongW
SendMessageW
SetPropW
GetSystemMetrics
ClientToScreen
SendDlgItemMessageW
GetDC
GetDlgItem
SetWindowLongW
DestroyIcon
GetUpdateRect
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
CheckDlgButton
wsprintfW
PostMessageW
SetWindowPos
SetWindowTextW
ShowWindow
EnableWindow
GetSysColorBrush
CheckRadioButton
InvalidateRect
ReleaseDC
GetClientRect
EndDialog
SetCursor
LoadCursorW
GetFocus
FillRect
GetSysColor
LoadStringW
InflateRect
LoadImageW
GetParent
advapi32
RegOpenKeyExA
RegQueryValueExA
CheckTokenMembership
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyW
CloseServiceHandle
gdi32
DeleteObject
GetTextExtentPointW
TextOutW
DeleteDC
IntersectClipRect
SetBkColor
SetTextAlign
SetTextColor
MoveToEx
SetDIBitsToDevice
GetBitmapBits
GetObjectW
SetStretchBltMode
BitBlt
Polyline
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetBkMode
StretchDIBits
ole32
CoUninitialize
CoInitialize
rpcrt4
RpcStringFreeW
NdrClientCall2
RpcSmDestroyClientContext
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcMgmtSetComTimeout
RpcEpResolveBinding
RpcBindingSetAuthInfoExW
RpcMgmtInqServerPrincNameW
msvcrt
__CxxFrameHandler
_except_handler3
qsort
memset
_vsnwprintf
memcpy
rand
_adjust_fdiv
_wcsdup
wcstok
free
_wcsicmp
wcschr
srand
_amsg_exit
_initterm
_XcptFilter
memmove
malloc
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ