C:\Users\user\Desktop\use\main\x64\Debug\Dll1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
708bba684ba8145011679e0853af8cdb3e8b4561da955c0e7f266d15dd0d0d4e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
708bba684ba8145011679e0853af8cdb3e8b4561da955c0e7f266d15dd0d0d4e.dll
Resource
win10v2004-20240226-en
General
-
Target
bf4f332827a5dd2aed14622f4f65bcf1.bin
-
Size
475KB
-
MD5
86c1bf01a9085e10a0eba840ce2b1cde
-
SHA1
9486e591d8126430ec6e735cd45caaa7abe84dfa
-
SHA256
2359313dcce34c9562797fcbbfa6fc6cccde645e9a20e1873bd9289c35e5443a
-
SHA512
20c07fd11f49f3ce32065342ae116a1a528241d9aa2bc92dc7ac1d2f8b91a7ce18585f3fa54da6d911a2ac20ef480d6986325298a17902607ea1066d1dff68e7
-
SSDEEP
12288:mT2jKBYJzkeDZAWRlDT822UJzMirwxBjK18Pr6X:mT2uB+keAGlDDZMnBjS8Pry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/708bba684ba8145011679e0853af8cdb3e8b4561da955c0e7f266d15dd0d0d4e.exe
Files
-
bf4f332827a5dd2aed14622f4f65bcf1.bin.zip
Password: infected
-
708bba684ba8145011679e0853af8cdb3e8b4561da955c0e7f266d15dd0d0d4e.exe.dll windows:6 windows x64 arch:x64
Password: infected
ad28e06ddcc4efb69619881798254e56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrlenA
CopyFileA
GetComputerNameA
SetEndOfFile
CreateFileW
SetStdHandle
GetVersionExA
Sleep
FindNextFileA
FindFirstFileA
FindClose
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
CreateDirectoryA
GetEnvironmentVariableA
FormatMessageA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
GetCurrentThreadId
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapSize
HeapValidate
GetSystemInfo
GetModuleHandleExW
ExitProcess
GetCurrentThread
HeapReAlloc
HeapQueryInformation
GetStdHandle
GetFileType
WriteFile
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
DeleteFileW
RtlUnwind
user32
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
GetUserNameA
urlmon
URLDownloadToFileA
wininet
HttpSendRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
HttpOpenRequestA
ws2_32
inet_ntoa
iphlpapi
GetAdaptersInfo
Sections
.textbss Size: - Virtual size: 769KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 863B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ