Z:\newmm_v1\client\CallDll\x64\Release\1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1_.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1_.dll
Resource
win10v2004-20240226-en
General
-
Target
1_.dll
-
Size
392KB
-
MD5
a7c2e87e9f947afdfe9e6a18f5e7c17b
-
SHA1
aad782a5fe3d99a52970b1978874b232c54baa5b
-
SHA256
57f64f170dfeaa1150493ed3f63ea6f1df3ca71ad1722e12ac0f77744fb1a829
-
SHA512
03bf5a51920196b6697f203764f2d61ebb799da27376cf5a95c1442dacd8f857682cad2ccd2181b10adbbf35f28ac50fdd5ff80d32b47b8a87515260df24b14d
-
SSDEEP
6144:CLeDtkdGtg+GQHYNnZou+dS+SgtMRDDyHSJxXzJl0TZDFihfQR7rmkzniAudl:6erkouCS+SIsyYrQkkA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1_.dll
Files
-
1_.dll.dll windows:5 windows x64 arch:x64
4c34f628c708b4f1d498e2c50ee07d05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadLibraryA
GetSystemInfo
GetModuleHandleA
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
SetEvent
CreateEventA
GetWindowsDirectoryA
GetModuleFileNameA
GetCurrentProcess
CreateFileA
SystemTimeToTzSpecificLocalTime
GetPrivateProfileIntA
GetFileAttributesA
TerminateProcess
FileTimeToSystemTime
MultiByteToWideChar
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetProcAddress
GetFileTime
GetVersion
LocalFree
FreeLibraryAndExitThread
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCurrentDirectoryW
SetCurrentDirectoryA
GetVersionExA
lstrcpyA
CreateToolhelp32Snapshot
Process32Next
lstrcmpiA
lstrcatA
OpenProcess
Process32First
QueryDosDeviceA
lstrlenA
GetLogicalDriveStringsA
DeleteFileA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
GetTickCount
CreateThread
CloseHandle
CreatePipe
GetSystemDirectoryA
ReadFile
CreateProcessA
Sleep
WriteFile
PeekNamedPipe
WritePrivateProfileStringA
LockResource
FindResourceExW
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
GetPrivateProfileStringA
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeW
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CreateFileW
GetExitCodeProcess
SetStdHandle
WriteConsoleW
GetStringTypeW
GetCurrentProcessId
HeapCreate
HeapSetInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
LoadLibraryW
GetTimeZoneInformation
SetFilePointer
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
MoveFileA
FindFirstFileExA
FileTimeToLocalFileTime
GetModuleHandleW
ExitProcess
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RtlPcToFileHeader
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsFree
SetLastError
FlsAlloc
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetSystemMetrics
advapi32
GetNamedSecurityInfoA
GetUserNameA
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
RegEnumValueA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
CreateWellKnownSid
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
DuplicateToken
GetTokenInformation
OpenProcessToken
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
EnumServicesStatusExA
CloseServiceHandle
OpenServiceA
LookupAccountSidA
ws2_32
ntohl
closesocket
connect
select
setsockopt
__WSAFDIsSet
gethostname
htonl
WSAStartup
gethostbyname
recv
send
ioctlsocket
WSAIoctl
recvfrom
inet_addr
htons
sendto
socket
shutdown
inet_ntoa
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesA
psapi
GetProcessImageFileNameA
netapi32
NetUserEnum
NetApiBufferFree
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ