Static task
static1
Behavioral task
behavioral1
Sample
02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c.dll
Resource
win10v2004-20240226-en
General
-
Target
02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c
-
Size
149KB
-
MD5
2352c17f2b72886d1be6f7ba361744de
-
SHA1
34510125926122fb5de035c6c174110fc16d668d
-
SHA256
02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c
-
SHA512
5b733958acf5f94bb2778f5c6d58c59ba1b83f0419f05e22e9e96577a5a5d08cf2a113a7db3ce913c78f2f280bfa0df5f4c1ed5c6532b880c09bf9f553418cbc
-
SSDEEP
1536:+QIMTIjIjkuvfZ/AuwGPtcbdr9+ozFKS4IkDHj/cRszQ5GDAm+3Vx+pD:HpM8xvfGGG5FinHj/UIAmQ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c
Files
-
02dcdecd7a4845c588a2fc84073829cfe868eb1828d1989242446ec125ed4b2c.dll windows:4 windows x86 arch:x86
b2e74dcd2d4818471932c6706d8625d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateProcess
Sleep
OpenProcess
WideCharToMultiByte
GlobalUnlock
DeleteFileA
WriteFile
GetTempPathA
ReadFile
GetFileSize
CreateFileA
TerminateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
SetThreadPriority
CreateEventA
OpenEventA
GetTickCount
OutputDebugStringA
GetCommandLineA
GetWindowsDirectoryA
GlobalAlloc
Process32First
GetVersionExA
GetLocalTime
CreateProcessA
MoveFileExA
GetSystemDirectoryA
GetCurrentThreadId
DeviceIoControl
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
MultiByteToWideChar
WriteProcessMemory
VirtualProtectEx
GetLastError
SetErrorMode
GlobalLock
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalFree
GetModuleFileNameA
GetCurrentProcess
CreateThread
CloseHandle
ReadProcessMemory
ExitProcess
Process32Next
IsBadReadPtr
user32
GetWindowTextA
PostMessageA
wsprintfA
GetWindowThreadProcessId
EnumWindows
GetMessageA
PostThreadMessageA
GetInputState
ClipCursor
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetOpenUrlW
InternetOpenW
ws2_32
inet_ntoa
getpeername
advapi32
OpenProcessToken
RegCloseKey
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
msvcrt
time
srand
strcmp
atoi
__CxxFrameHandler
??3@YAXPAX@Z
wcscmp
wcslen
strchr
strstr
strrchr
strcat
memcpy
memset
sprintf
strlen
strcpy
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xcata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zcata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vcata Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ