MainEntry
Static task
static1
Behavioral task
behavioral1
Sample
072022b54085690001ff9ec546051b2f60564ffbf5b917ac1f5a0e3abe7254a5.dll
Resource
win7-20240221-en
General
-
Target
072022b54085690001ff9ec546051b2f60564ffbf5b917ac1f5a0e3abe7254a5
-
Size
289KB
-
MD5
190622365cebc21fc7cacf96c3ae7055
-
SHA1
00c25712556e39b042da2f977d987e4b9ca9b805
-
SHA256
072022b54085690001ff9ec546051b2f60564ffbf5b917ac1f5a0e3abe7254a5
-
SHA512
03699c379735b0fc51485ecbe29b10622312187e66f1e9be6839247e195e76b645092ab151dcacd2b9bb48d5d2950e4f91b26cfd6111b862008f17f426e3488e
-
SSDEEP
6144:j7zTJARcZd2i5h2SJy2H0EH+maS+dca5R9TeQwLR/OjTiKjn:jHTJARcZdNftXLReTl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 072022b54085690001ff9ec546051b2f60564ffbf5b917ac1f5a0e3abe7254a5
Files
-
072022b54085690001ff9ec546051b2f60564ffbf5b917ac1f5a0e3abe7254a5.dll windows:5 windows x64 arch:x64
7d505ed1d31ebafd9fcbf7a8a10c721c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
ReadFile
WriteFile
WideCharToMultiByte
GetFileSize
SetFilePointer
LoadLibraryA
GetSystemDirectoryA
GetFileAttributesExA
CreatePipe
CreateProcessA
PeekNamedPipe
CreateFileW
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
DecodePointer
GetModuleFileNameA
GetPrivateProfileStringW
SystemTimeToFileTime
SetFileTime
SetEndOfFile
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcAddress
GetModuleHandleA
CreateFileA
GlobalAlloc
GetTickCount
GetLocalTime
WaitForSingleObject
GetTempPathA
ReadConsoleW
WriteConsoleW
OutputDebugStringW
FlushFileBuffers
SetStdHandle
LCMapStringW
GetStringTypeW
HeapReAlloc
LoadLibraryExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
CreateDirectoryA
GetCurrentThread
GetLastError
MultiByteToWideChar
GlobalFree
CloseHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
GetSystemTimeAsFileTime
HeapFree
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
GetCurrentThreadId
SetLastError
HeapAlloc
RtlPcToFileHeader
GetProcessHeap
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
RtlUnwindEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
advapi32
CryptGenRandom
RegEnumKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
SetThreadToken
OpenThreadToken
DuplicateToken
OpenProcessToken
CryptAcquireContextW
CryptReleaseContext
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoCreateGuid
winhttp
WinHttpQueryHeaders
WinHttpConnect
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryOption
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCloseHandle
WinHttpAddRequestHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
WinHttpQueryAuthSchemes
WinHttpSetCredentials
WinHttpOpen
iphlpapi
IcmpSendEcho
IcmpCreateFile
GetNetworkParams
GetAdaptersInfo
IcmpCloseHandle
urlmon
UrlMkGetSessionOption
ws2_32
ntohl
inet_addr
gethostname
gethostbyname
inet_ntoa
WSAStartup
WSACleanup
Exports
Exports
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ