WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
c7435de6a90979d5c62244358fa217a7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7435de6a90979d5c62244358fa217a7.dll
Resource
win10v2004-20240226-en
General
-
Target
c7435de6a90979d5c62244358fa217a7
-
Size
54KB
-
MD5
c7435de6a90979d5c62244358fa217a7
-
SHA1
4d27de3df0ec17278f7fc013007fd8bd0cdf6e08
-
SHA256
f67b12d4bdea7b552a2772a53d4200f45425d05253c8ded30f1c58587054ffe9
-
SHA512
3cc2af920840064fd9ed5fd5890459c304f4e6454aec87c1f7ca49cb4c42edd61a1116d994c5383f966252f2f330d932c56d157b867ea53acf623224d1e3cd97
-
SSDEEP
1536:Fs63wN6nUnJ6a14b3p2plNVwIqRLdpgm01s/D:Fs6gN1nJ6a14b5ElNVlq/OpO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7435de6a90979d5c62244358fa217a7
Files
-
c7435de6a90979d5c62244358fa217a7.dll windows:4 windows x86 arch:x86
3e1e78a084287efef5d2262be36d181e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetFileAttributesA
CreateFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetTickCount
FindClose
FindFirstFileA
SetFilePointer
DeleteFileW
FindNextFileW
FileTimeToSystemTime
CreateFileW
FindFirstFileW
GetTempPathW
DeleteFileA
FindNextFileA
GetTempPathA
GetVersionExA
LoadLibraryA
GetFileTime
lstrlenA
TerminateThread
ReleaseMutex
GetModuleFileNameA
DeviceIoControl
OpenMutexA
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetLastError
FreeLibrary
SetFileTime
GetComputerNameA
CreateMutexA
SetCurrentDirectoryA
FlushFileBuffers
SetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
WriteFile
lstrcpyA
CreatePipe
CreateProcessA
CreateThread
WaitForSingleObject
ReadFile
PeekNamedPipe
GetCurrentProcess
TerminateProcess
Sleep
OpenProcess
CloseHandle
GetProcAddress
user32
DestroyWindow
IsWindow
SendMessageA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegOpenKeyExA
shell32
ShellExecuteA
StrStrIA
ws2_32
socket
inet_ntoa
inet_addr
closesocket
gethostbyname
htons
sendto
recvfrom
setsockopt
recv
WSAIoctl
bind
gethostname
ntohs
send
connect
WSAStartup
msvfw32
MCIWndCreateA
avicap32
capCreateCaptureWindowA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
msvcrt
_strlwr
_itoa
_strnicmp
_adjust_fdiv
malloc
_initterm
free
memchr
strrchr
strncmp
fopen
fseek
fread
fclose
rename
swprintf
wcslen
strstr
time
srand
rand
??2@YAPAXI@Z
atoi
_except_handler3
sprintf
??3@YAXPAX@Z
__CxxFrameHandler
shlwapi
SHGetValueA
SHSetValueA
Exports
Exports
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ