GetFlashSetting
Static task
static1
Behavioral task
behavioral1
Sample
ac7c2bc0c66c44653a68b36411608c90.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac7c2bc0c66c44653a68b36411608c90.dll
Resource
win10v2004-20240226-en
General
-
Target
ac7c2bc0c66c44653a68b36411608c90
-
Size
361KB
-
MD5
ac7c2bc0c66c44653a68b36411608c90
-
SHA1
2c64138ef1120ff5ad524e9f2dd1a55204df3e75
-
SHA256
5a2f4c43dd3f90f29331f8397bb0e1a64ca9cff602e82e2a175a569d78367274
-
SHA512
0bb81a67dc46f2d520f92757780916ce22d491b65cffff0efe38670c44c4566af5d41b82dc9702ebdd95700d1ec9342a255d194650b71453ba4d6784f8afd752
-
SSDEEP
6144:MLwG4kJaebRudgZJLG28TZyDyaxf7K4pbGEeSYu3PlXRX99JgWUT:M8TBeANUNxf7KWBR/36WUT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac7c2bc0c66c44653a68b36411608c90
Files
-
ac7c2bc0c66c44653a68b36411608c90.dll windows:4 windows x86 arch:x86
26c9396428e5f5b519fced904433c5dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageA
ord8
kernel32
GetFullPathNameA
GetFullPathNameW
DeleteFileA
DeleteFileW
CreateDirectoryA
GetVersionExA
GetModuleFileNameA
GetLocaleInfoA
GetNumberFormatA
WideCharToMultiByte
ExpandEnvironmentStringsA
WaitForSingleObject
lstrcpynW
lstrcpynA
FindResourceA
LoadLibraryExA
CompareStringA
GetCurrentProcess
Sleep
SystemTimeToFileTime
MultiByteToWideChar
IsDBCSLeadByte
GetCPInfo
GetTempPathA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
HeapSize
InitializeCriticalSectionAndSpinCount
GetVersion
GetStartupInfoA
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
HeapDestroy
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetDriveTypeA
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetProcessHeap
GetLastError
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetCommandLineA
GetCurrentThreadId
LeaveCriticalSection
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
user32
OemToCharA
CharUpperW
CharLowerW
CharLowerA
LoadStringA
GetWindowRect
SetWindowPos
GetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
CharToOemA
GetWindowLongA
SetWindowTextA
wsprintfW
GetSysColor
LoadImageA
SendDlgItemMessageA
CharUpperA
SetDlgItemTextA
wsprintfA
SetWindowLongA
GetDlgItemTextA
GetClientRect
BeginPaint
EndPaint
CreatePopupMenu
InsertMenuItemA
InsertMenuItemW
GetParent
InvalidateRect
GetDC
SendMessageA
ReleaseDC
ShowWindow
GetDlgItem
gdi32
GetObjectA
CreateCompatibleDC
GetPixel
SetPixel
DeleteDC
TextOutA
CreatePen
CreateSolidBrush
SetTextColor
Polygon
Polyline
DeleteObject
SelectObject
GetTextFaceA
GetTextMetricsA
CreateFontA
GetDeviceCaps
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shell32
DragQueryFileA
ShellExecuteExA
SHGetPathFromIDListA
DragQueryFileW
ole32
ReleaseStgMedium
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 163KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ