0EKQegq4IaskYQqq
Static task
static1
Behavioral task
behavioral1
Sample
67a227d11d70f83f80697c311f6ceae681bca37de2d56096e45eec6196650c6a.dll
Resource
win10v2004-20231215-en
General
-
Target
67a227d11d70f83f80697c311f6ceae681bca37de2d56096e45eec6196650c6a.7z
-
Size
12.9MB
-
MD5
22b585c2c9d313d7adeea8609db8be2f
-
SHA1
ca26438778a2181fdc38dd7c94210d24ae4738f6
-
SHA256
8f1aa2e544def815cafc14bd82104b06e80a3f57c6857c8977c9da046e3c81eb
-
SHA512
b6a5b6064f2ee0156c3fdd1085f8b9260bceae994509c1323046ed492621b3a605c1eb5967184688890628a38d9115b3a046bdc261884630956f97f2b3f5ec94
-
SSDEEP
196608:5uGWluruaTa6U1dxK4KsF/nfl1VwipQgS9yH4SojvXGxPKnJHHp6M1Q5POEIK8B:5UWTTatxsspl1V5pSs4SUvG12AMOO/B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/67a227d11d70f83f80697c311f6ceae681bca37de2d56096e45eec6196650c6a
Files
-
67a227d11d70f83f80697c311f6ceae681bca37de2d56096e45eec6196650c6a.7z.7z
Password: infected
-
67a227d11d70f83f80697c311f6ceae681bca37de2d56096e45eec6196650c6a.dll windows:5 windows x86 arch:x86
Password: infected
e0a657a2f78a27127755e0a4a69d83e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
clusapi
OpenClusterNetwork
GetClusterNotify
GetClusterQuorumResource
FailClusterResource
rpcrt4
RpcSsGetThreadHandle
kernel32
HeapCreate
HeapAlloc
lstrlenA
HeapFree
Sleep
GetCurrentProcess
GetModuleHandleA
CloseHandle
GetSystemDirectoryA
FlushFileBuffers
CreateFileW
HeapSize
IsProcessorFeaturePresent
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStringTypeW
LCMapStringW
MultiByteToWideChar
WriteConsoleW
SetStdHandle
ExitThread
GetCurrentThreadId
GetLastError
CreateThread
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
GetModuleFileNameW
RtlUnwind
HeapReAlloc
user32
CheckMenuItem
DestroyWindow
AnyPopup
BeginPaint
advapi32
DeregisterEventSource
RegUnLoadKeyA
SetEntriesInAclA
RegReplaceKeyW
ole32
OleSetClipboard
HDC_UserUnmarshal
STGMEDIUM_UserSize
OleCreateLink
Exports
Exports
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ