ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
9af584c79ba82824ff4fc5986d651a47.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9af584c79ba82824ff4fc5986d651a47.dll
Resource
win10v2004-20231215-en
General
-
Target
9af584c79ba82824ff4fc5986d651a47
-
Size
74KB
-
MD5
9af584c79ba82824ff4fc5986d651a47
-
SHA1
1fc8a9ab049341267d95be7ecb907ab3222afa08
-
SHA256
f0e412d02232da2e6fe6aad869c7e490369470c9c60572f4389a48efe7779ccb
-
SHA512
d8fd2f70cbc08a70569e663effd5bcf83ba32cb716497c390d7d35c39af57f737145c8f51fd983deebbf74859eae6e061f1ffa4332767282f1c7a2457bd87be9
-
SSDEEP
1536:7Z7owDXOAHGtj0rwP1noqT6UUISjNhoPRg:JDXpm2wqOaNhoJg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9af584c79ba82824ff4fc5986d651a47
Files
-
9af584c79ba82824ff4fc5986d651a47.dll windows:4 windows x86 arch:x86
b40572cae13d93c40a4e4631a3ed6b43
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
GetModuleFileNameA
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Sleep
CreateThread
MoveFileExA
GetWindowsDirectoryA
MoveFileA
CopyFileA
GetFileSize
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
LCMapStringW
LCMapStringA
FlushFileBuffers
ExitProcess
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
CreatePipe
GetDriveTypeA
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
DeleteFileA
ReadFile
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
HeapReAlloc
HeapFree
RtlUnwind
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
ExitWindowsEx
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
shell32
SHGetFileInfoA
ShellExecuteA
ws2_32
send
WSASocketA
gethostbyname
inet_addr
shutdown
recv
closesocket
connect
socket
htons
WSAStartup
setsockopt
htonl
sendto
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ