maggie
Static task
static1
Behavioral task
behavioral1
Sample
1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc.dll
Resource
win10v2004-20240319-en
General
-
Target
1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc
-
Size
221KB
-
MD5
7d08db363c0f3554de7fe097f58e31b2
-
SHA1
5796068cfd79fba65394114ba0edc8cc93eae151
-
SHA256
1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc
-
SHA512
48beef9968fa10eafe8797164f69ec3a9315ef30281b50f10777dfffd77451f47d630b9bc2b0f65bb205a970ece520bc0c6e454f086ccb4ea44cc0489734ec58
-
SSDEEP
6144:Xr5W643GPpujEqC90pwwHTj5KrLB8pHHxT:Xrb8PC9B2Qr1kp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc
Files
-
1b786138bf978821dd8151bcd8acb20a3c24cb186cb459326eb6449d713d08dc.dll windows:5 windows x64 arch:x64
dadfe76bb642d259f3a32b6ca6be747f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
DuplicateHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindNextFileA
GetModuleFileNameA
CreateProcessA
CreatePipe
GetEnvironmentVariableA
DeleteFileA
WideCharToMultiByte
GlobalMemoryStatusEx
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThread
OutputDebugStringA
Sleep
IsBadReadPtr
GetVersionExA
GetSystemInfo
GetCurrentProcess
LocalFree
GlobalFree
CreateThread
WaitForSingleObject
GetSystemDirectoryA
GetTickCount
WriteFile
SetFilePointer
GetLastError
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetProcessHeap
HeapAlloc
HeapFree
CreateFileA
DeviceIoControl
CloseHandle
GlobalAlloc
FindFirstFileA
ReadFile
FindClose
VirtualQueryEx
VirtualProtectEx
SuspendThread
VirtualFree
GetCPInfo
RtlPcToFileHeader
RaiseException
FlsAlloc
SetLastError
FlsFree
FlsGetValue
HeapSetInformation
DecodePointer
EncodePointer
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetThreadContext
SetThreadContext
FlushInstructionCache
ResumeThread
VirtualAlloc
VirtualProtect
VirtualQuery
LoadLibraryExA
LoadLibraryExW
lstrlenA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapReAlloc
FlushFileBuffers
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
GetLocaleInfoA
TerminateProcess
GetStringTypeW
GetStringTypeA
HeapSize
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
ExitProcess
GetModuleHandleW
HeapDestroy
HeapCreate
GetCommandLineA
FlsSetValue
GetCurrentThreadId
RtlUnwindEx
RtlLookupFunctionEntry
MultiByteToWideChar
user32
PostMessageA
GetSystemMetrics
TranslateMessage
DispatchMessageA
GetMessageA
LoadIconA
LoadCursorA
RegisterClassA
SetTimer
KillTimer
DefWindowProcA
CreateWindowExA
CharLowerBuffA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
StartServiceA
ChangeServiceConfigA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
RegOpenKeyExA
RegQueryValueExA
LookupAccountSidA
GetAclInformation
GetAce
IsValidSid
GetSecurityDescriptorDacl
GetFileSecurityA
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoA
FreeSid
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
odbc32
ord39
ord41
ord11
ord43
ord13
ord36
ord9
ord24
ord75
ord31
opends60
ord26
ord42
ord41
ord25
ord40
ws2_32
gethostname
gethostbyname
inet_ntop
WSAGetLastError
getpeername
inet_ntoa
WSASocketA
WSAEventSelect
ioctlsocket
socket
htons
inet_addr
connect
select
__WSAFDIsSet
recv
send
closesocket
WSASetLastError
WSAStartup
setsockopt
WSAAsyncGetHostByName
listen
bind
htonl
shutdown
WSAAccept
WSASendTo
WSASend
getsockname
WSARecv
WSARecvFrom
WSACleanup
WSAAsyncSelect
WSAIoctl
wininet
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetConnectA
InternetOpenA
InternetCrackUrlA
netapi32
NetUserEnum
NetApiBufferFree
gdi32
GetStockObject
Exports
Exports
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ