Static task
static1
Behavioral task
behavioral1
Sample
d3db77d092c0ed097bd54083451485b8.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3db77d092c0ed097bd54083451485b8.dll
Resource
win10v2004-20240226-en
General
-
Target
d3db77d092c0ed097bd54083451485b8
-
Size
251KB
-
MD5
d3db77d092c0ed097bd54083451485b8
-
SHA1
0145fc1466e744be6c13385ccd1c8042d312e7b2
-
SHA256
72808376efb78dee452ba3f4e98b7c6110ee66ea06bf5bd35571ce1733467ee1
-
SHA512
e93d26214e5ef0ecb41bc3497ab2021067d6f9e3e69bff6370d2631baef7d7162184e0036343695380331842ccf87701c170fdc826b2fe98f8ee70a8d13e6db2
-
SSDEEP
3072:572tAy/YnrtNmPVWvb4dMYrJSQ2dbbsbYT00wRIz0oXugiRE1RJVdfET84bmyopP:FdpItLCk8TNn4giRgR7da8EmyKAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3db77d092c0ed097bd54083451485b8
Files
-
d3db77d092c0ed097bd54083451485b8.dll windows:4 windows x86 arch:x86
1f4176c4d40810ef36da93c8c85e3090
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
CreateProcessWithLogonW
LookupAccountSidW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
StartServiceW
QueryServiceStatus
winhttp
WinHttpSendRequest
WinHttpSetOption
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpen
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpConnect
ole32
CoGetClassObject
CoCreateGuid
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoTaskMemFree
CoInitializeEx
CoUninitialize
oleaut32
SysStringLen
VariantClear
SysAllocString
SysFreeString
urlmon
ObtainUserAgentString
rpcrt4
RpcAsyncCompleteCall
RpcBindingFree
RpcAsyncInitializeHandle
NdrAsyncClientCall
ntdll
RtlOpenCurrentUser
NtFreeVirtualMemory
NtAllocateVirtualMemory
NtProtectVirtualMemory
NtReadVirtualMemory
NtQueryVirtualMemory
NtCreateThread
RtlSubAuthoritySid
RtlLengthRequiredSid
RtlEqualSid
RtlCopySid
NtSetEvent
RtlLengthSid
RtlCreateAcl
NtCreateProcess
NtOpenProcessToken
NtSetInformationToken
NtQueryInformationToken
RtlSubAuthorityCountSid
RtlGetSaclSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlGetControlSecurityDescriptor
RtlLengthSecurityDescriptor
RtlGetDaclSecurityDescriptor
RtlMakeSelfRelativeSD
RtlGetOwnerSecurityDescriptor
NtAdjustPrivilegesToken
NtDuplicateToken
NtQuerySecurityObject
NtSetSecurityObject
NtFilterToken
LdrUnlockLoaderLock
LdrLockLoaderLock
NtQuerySystemInformation
wcsncmp
LdrUnloadDll
RtlReAllocateHeap
_snwprintf
NtQueueApcThread
RtlRemoveVectoredExceptionHandler
RtlAddVectoredExceptionHandler
NtOpenTimer
NtCreateTimer
NtQueryAttributesFile
NtCreateIoCompletion
NtOpenMutant
NtCreateKeyedEvent
NtOpenKeyedEvent
NtOpenIoCompletion
NtOpenSymbolicLinkObject
NtOpenEvent
NtOpenDirectoryObject
NtDeleteFile
RtlNtStatusToDosErrorNoTeb
NtCreateEvent
NtCreateNamedPipeFile
NtCreateSemaphore
NtCreateMutant
NtQueryFullAttributesFile
NtOpenSemaphore
RtlPrefixUnicodeString
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
RtlAllocateHeap
RtlFreeHeap
NtOpenFile
LdrLoadDll
NtOpenKey
NtResumeThread
RtlInitializeCriticalSection
RtlLeaveCriticalSection
_chkstk
memset
memcpy
_allmul
_aulldvrm
_aullshr
_allshl
RtlDeleteCriticalSection
RtlEnterCriticalSection
NtReadFile
NtFlushBuffersFile
NtCreateFile
NtUnlockFile
NtQueryDirectoryFile
NtQueryInformationFile
NtSetInformationFile
wcsncpy
NtLockFile
NtWriteFile
NtCreateSection
NtOpenSection
NtUnmapViewOfSection
NtMapViewOfSection
NtSetInformationProcess
NtQueryInformationProcess
NtOpenProcess
RtlEqualUnicodeString
NtQueryInformationJobObject
NtIsProcessInJob
NtAssignProcessToJobObject
NtSetInformationJobObject
NtCreateJobObject
NtTerminateProcess
NtSuspendProcess
NtDeleteKey
NtSetValueKey
NtQueryValueKey
NtNotifyChangeKey
NtCreateKey
NtDeleteValueKey
RtlInitUnicodeString
NtEnumerateKey
NtEnumerateValueKey
RtlGetNativeSystemInformation
RtlVerifyVersionInfo
VerSetConditionMask
NtDuplicateObject
NtQueryObject
NtClose
NtSetInformationObject
NtOpenThread
NtSetInformationThread
NtQueryInformationThread
CsrClientCallServer
NtTerminateThread
RtlExitUserThread
NtReleaseMutant
NtDelayExecution
NtPulseEvent
NtQuerySemaphore
NtClearEvent
NtWaitForSingleObject
NtQueryEvent
NtReleaseSemaphore
LdrAddRefDll
NtWaitForMultipleObjects
RtlInitializeSid
_aulldiv
kernel32
CreateEventW
CreateMutexW
CreateSemaphoreW
OpenMutexW
CreateProcessW
GetSystemWow64DirectoryW
GlobalFree
GetTempFileNameW
GetTempPathW
CreateFileW
DeleteAtom
FindAtomW
AddAtomW
GetTickCount
GetWindowsDirectoryW
GetSystemDirectoryW
ExitProcess
IsBadReadPtr
OpenSemaphoreW
SearchPathW
ResumeThread
user32
CloseDesktop
CloseWindowStation
GetWindowThreadProcessId
GetForegroundWindow
MsgWaitForMultipleObjects
SetActiveWindow
GetMessageW
PostQuitMessage
IsWindowEnabled
SetFocus
TranslateMessage
PeekMessageW
ShowWindow
IsWindow
GetSystemMetrics
IsWindowVisible
EnableWindow
ValidateRect
DispatchMessageW
GetSystemMenu
DialogBoxIndirectParamW
GetWindowTextW
EnableMenuItem
GetDlgItem
EndDialog
SendDlgItemMessageW
MessageBoxW
LockSetForegroundWindow
SendInput
SetForegroundWindow
GetParent
AttachThreadInput
BringWindowToTop
SystemParametersInfoW
SetWindowPos
GetWindow
UnregisterClassW
RegisterClassExW
SetClassLongW
CreateWindowExW
DefWindowProcW
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetProcessWindowStation
OpenDesktopW
EnumDesktopsW
EnumWindowStationsW
SetThreadDesktop
OpenWindowStationW
GetWindowLongW
SetWindowLongW
SendMessageTimeoutW
DestroyWindow
PostMessageW
FindWindowW
FindWindowExW
MessageBoxTimeoutW
MessageBoxIndirectW
netapi32
NetApiBufferFree
NetLocalGroupGetMembers
dnsapi
DnsRecordListFree
DnsQuery_W
shell32
SHGetFolderPathW
shlwapi
ord15
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ