Static task
static1
Behavioral task
behavioral1
Sample
aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863.dll
Resource
win10v2004-20240226-en
General
-
Target
aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863
-
Size
138KB
-
MD5
fb8c141f4c16f092541e98c292aba1a2
-
SHA1
11cfeecfd7f7babecd799b7a6dc41f8d450427ee
-
SHA256
aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863
-
SHA512
9eff8dfefff39fcf5ed62c453069206bcd9611de315fa0e81e2febe74e9126944f072e72ac3e1352c38a83a4eb4bb00d11868de97c98b91d7c17b21d4a076ae2
-
SSDEEP
3072:il+Hql+jphXzS2aWgedgMdZYY9qrAX+cDQbp6TBfJ5zyu:il+pjphjaWgedgMAY9qrI+cop6TBh5+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863
Files
-
aa75701d880f3d715562d7907f26c6328081adc5a52c31bd4da022271604e863.dll windows:5 windows x64 arch:x64
3cfc4a827245141e08dc6e69b68b2f9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
psapi
GetModuleInformation
shlwapi
StrCmpNA
StrCmpNIA
StrStrIA
PathCombineW
wvnsprintfA
kernel32
lstrlenA
FlushFileBuffers
WriteFile
SetNamedPipeHandleState
CreateFileA
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
lstrcmpA
SetLastError
GetLastError
InitializeCriticalSection
CreateMutexA
Thread32Next
Thread32First
SetThreadContext
GetThreadContext
GetCurrentProcessId
VirtualFree
VirtualQuery
VirtualAlloc
GetSystemInfo
HeapReAlloc
HeapAlloc
CloseHandle
GetCurrentThreadId
SuspendThread
OpenThread
HeapFree
ResumeThread
FlushInstructionCache
GetCurrentProcess
Sleep
HeapCreate
HeapDestroy
GetPrivateProfileStringW
lstrcpyA
GetFileAttributesW
CreateFileW
GetLocalTime
WaitForSingleObject
SleepEx
CreateThread
SetEvent
CreateEventA
TerminateThread
lstrcatA
LoadResource
SizeofResource
FindResourceA
GetEnvironmentVariableA
lstrcmpW
lstrlenW
GetTickCount
ReleaseMutex
MultiByteToWideChar
CreateEventW
lstrcmpiA
GetSystemTimeAsFileTime
GetFileSize
lstrcpynA
SetFilePointer
DeleteFileW
SetFileAttributesW
GetFileAttributesA
GetCurrentThread
LocalAlloc
GetCommandLineA
GetVersionExA
GetModuleFileNameA
SetEnvironmentVariableA
GetWindowsDirectoryA
GetPrivateProfileIntW
LoadLibraryA
user32
ToAscii
GetKeyboardState
GetWindowTextA
advapi32
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenThreadToken
OpenProcessToken
shell32
SHGetFolderPathW
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ