usbPathclass
Static task
static1
Behavioral task
behavioral1
Sample
bb3ef80bff77a9c7bc69701eb5774baf.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb3ef80bff77a9c7bc69701eb5774baf.dll
Resource
win10v2004-20240226-en
General
-
Target
bb3ef80bff77a9c7bc69701eb5774baf
-
Size
140KB
-
MD5
bb3ef80bff77a9c7bc69701eb5774baf
-
SHA1
63b093d70f134600e4f9cf2258f1620a2720a758
-
SHA256
4bee19a7c8c4e2f8d45ee33809e6cb3c3be6d7b387c4f0de9f5bcd8853a6aee0
-
SHA512
67a4a57b6a1361567b12dd4a29658efb85ed136bd7447f20dd5c9e8d1d40ecbc07022516aaeda98b702bcc168cdb3ffb5369149b214851e8147d0c3d62ccdf02
-
SSDEEP
3072:z5Vfmy041FAwwPsUW1uPHvylLrcwNs7AdqZUUE0ZOAKQ:zbmB41jwP9bPa7dqUU2l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb3ef80bff77a9c7bc69701eb5774baf
Files
-
bb3ef80bff77a9c7bc69701eb5774baf.dll windows:4 windows x86 arch:x86
f8d7a2c7b7140e90172dce5b7d823218
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
CreateMutexW
CreateFileMappingA
OpenEventA
GlobalAlloc
InterlockedIncrement
HeapFree
GetCurrentProcess
WaitForSingleObject
GetModuleFileNameA
GetVolumeInformationA
LoadLibraryA
GetModuleHandleA
UnmapViewOfFile
CreateFileA
InterlockedDecrement
GetProcessHeap
CreateEventA
TerminateProcess
OpenFileMappingA
SetLastError
LeaveCriticalSection
CreateProcessA
ReadProcessMemory
EnterCriticalSection
GlobalFree
HeapAlloc
GetProcAddress
GetCommandLineA
InterlockedCompareExchange
ExitProcess
WriteProcessMemory
CloseHandle
MapViewOfFile
WriteFile
GetTickCount
GetComputerNameA
CreateDirectoryA
Sleep
CopyFileA
GetLastError
ole32
CoUninitialize
CoTaskMemAlloc
CoSetProxyBlanket
OleSetContainedObject
CoCreateGuid
CoInitialize
CoCreateInstance
OleCreate
user32
SetWindowLongA
GetWindowLongA
GetSystemMetrics
ScreenToClient
GetWindow
FindWindowA
SetWindowsHookExA
TranslateMessage
GetClassNameA
GetParent
RegisterWindowMessageA
DefWindowProcA
DispatchMessageA
GetCursorPos
SendMessageA
ClientToScreen
SetTimer
KillTimer
UnhookWindowsHookEx
GetMessageA
PeekMessageA
CreateWindowExA
DestroyWindow
GetWindowThreadProcessId
PostQuitMessage
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteValueA
RegCreateKeyExA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
RegDeleteKeyA
SetTokenInformation
RegSetValueExA
RegCloseKey
DuplicateTokenEx
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ