Static task
static1
Behavioral task
behavioral1
Sample
c2a688f66350b389ad7c250cc6372407.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2a688f66350b389ad7c250cc6372407.dll
Resource
win10v2004-20240226-en
General
-
Target
c2a688f66350b389ad7c250cc6372407
-
Size
176KB
-
MD5
c2a688f66350b389ad7c250cc6372407
-
SHA1
50dfd0c444a8ee5bcea0eb9257c174806db7ea58
-
SHA256
a28d580b4c78e298e41b8e27f60a903a9676addfa1f73b1a5964a284f34538b7
-
SHA512
9f2aaf82c66e3d9f74cc2de552d101dc74bea6b81143ab52264f02c48690151493dbcc87e0a89b978306c0e796327d1dee6e4f3849125906fa72569c48c48e1f
-
SSDEEP
3072:GonrGkZ5RKETalCWsgpqxyCe6j94afTG+cBrlWkqzs2Ymt/9R:G4aegsYUnfTCrUr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2a688f66350b389ad7c250cc6372407
Files
-
c2a688f66350b389ad7c250cc6372407.dll windows:4 windows x86 arch:x86
93c458592c58ddc9629cc1257b4343d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
SetFilePointer
LoadLibraryW
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
GetProcAddress
FindClose
SystemTimeToFileTime
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ