Static task
static1
Behavioral task
behavioral1
Sample
a1424ab18043ac4ef69fa8fd10378469.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1424ab18043ac4ef69fa8fd10378469.dll
Resource
win10v2004-20240221-en
General
-
Target
a1424ab18043ac4ef69fa8fd10378469
-
Size
78KB
-
MD5
a1424ab18043ac4ef69fa8fd10378469
-
SHA1
e7807b044b47ec081866895da05fb413b29a7784
-
SHA256
ce7a52200ee8d694a689d9a2ebe395a0e59d3b7d6438f6cf035515144c70d2ca
-
SHA512
7b197e09b4ac5f26bba2ecf0b26d4b93a50fe8ef14f167dc06acba5dd83e694083b9ac36b23449bd04d9c32c35e42f564d2aeaacddb15b485f18c179b3e81b09
-
SSDEEP
1536:bEtlgFkOTA80+x/UUrsSrq2awYqoQIRsWcdcd/sCQ3gp:AtJeUUrxWfLl9/sCCQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1424ab18043ac4ef69fa8fd10378469
Files
-
a1424ab18043ac4ef69fa8fd10378469.dll windows:5 windows x86 arch:x86
a815c012163e90c99d1e4fe5e0486eb4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FindFirstFileW
WriteFile
TerminateProcess
GetModuleFileNameW
CreateMutexW
FindClose
WaitForSingleObject
ExitThread
CreateThread
GetCurrentProcessId
IsBadWritePtr
SetLastError
GetSystemDirectoryW
ReadProcessMemory
GetModuleHandleW
IsBadReadPtr
RaiseException
DecodePointer
WriteConsoleW
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualFree
GlobalFree
GlobalAlloc
MultiByteToWideChar
lstrcpyW
GetFileSize
CloseHandle
CreateFileW
lstrlenW
ReadFile
LoadLibraryW
GetCurrentProcess
SetFilePointerEx
GetConsoleMode
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedFlushSList
RtlUnwind
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
WideCharToMultiByte
HeapFree
HeapAlloc
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetConsoleCP
VirtualQuery
user32
wsprintfA
advapi32
RegQueryValueW
RegOpenKeyExW
RegQueryValueExW
CryptDestroyKey
CryptAcquireContextW
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptSetKeyParam
CryptReleaseContext
RegSetValueW
RegCloseKey
psapi
GetModuleFileNameExW
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ