Static task
static1
Behavioral task
behavioral1
Sample
cdaafeea1664b6e329d0ed6a9174a663.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdaafeea1664b6e329d0ed6a9174a663.dll
Resource
win10v2004-20240226-en
General
-
Target
cdaafeea1664b6e329d0ed6a9174a663
-
Size
40KB
-
MD5
cdaafeea1664b6e329d0ed6a9174a663
-
SHA1
e1c59087f188d0d3212e8e7e7d18390dceda685b
-
SHA256
0e5101735616b8249bf18a0bcece436c390c1ea05e3d51eec437c3f7703fc77a
-
SHA512
470c2154dc0c65384f47f17ea64f26f26d185740f55a151f086f3e914e45e973511f03ba2ac032a103cfbb12d186a63c1018154be244f94fd79d2f1304f6ea9a
-
SSDEEP
768:dWOAMmk9f1LjweKE1sISmOzizeQfQUQvpr7zm:dWjMZdEEWmgCe+WH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdaafeea1664b6e329d0ed6a9174a663
Files
-
cdaafeea1664b6e329d0ed6a9174a663.dll windows:4 windows x86 arch:x86
a9eb65b40d10b23bb9c905b7f1a99635
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalMemoryStatus
GetComputerNameA
CreateEventA
ResetEvent
TerminateThread
ExitThread
WinExec
FindNextFileA
GetLastError
FindClose
FindFirstFileA
SetCurrentDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLocalTime
GetDriveTypeA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
VirtualProtectEx
GetModuleFileNameA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetSystemInfo
GetVersionExA
GetProcessHeap
LoadLibraryA
GetProcAddress
HeapAlloc
HeapFree
CreateThread
Sleep
SetConsoleCtrlHandler
GetModuleHandleA
GetSystemTime
SetFilePointer
GetFileSize
SetEvent
GetCurrentThreadId
CopyFileA
CreateProcessA
WaitForSingleObject
DeleteFileA
GetFileTime
WriteFile
SetFileTime
GetSystemDirectoryA
CreateFileA
ReadFile
MoveFileA
CloseHandle
user32
SetCursorPos
keybd_event
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
GetKeyState
PostThreadMessageA
GetKeyNameTextA
GetWindowTextA
GetForegroundWindow
CallNextHookEx
mouse_event
SetTimer
GetDC
ReleaseDC
KillTimer
CloseWindowStation
CloseDesktop
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
LineTo
MoveToEx
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
CreateDCA
GetDeviceCaps
DeleteObject
CreatePen
DeleteDC
advapi32
AdjustTokenPrivileges
ControlService
LookupPrivilegeValueA
OpenProcessToken
StartServiceA
ChangeServiceConfigA
OpenServiceA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
DeleteService
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
send
WSAStartup
gethostbyname
htons
WSASocketA
connect
closesocket
select
recv
urlmon
URLDownloadToFileA
msvcrt
memcpy
memset
??2@YAPAXI@Z
sprintf
atoi
strcpy
_strupr
strstr
strcat
strlen
__CxxFrameHandler
strcmp
memcmp
wcslen
free
_initterm
malloc
_adjust_fdiv
_itoa
_wcsupr
??3@YAXPAX@Z
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ