Static task
static1
Behavioral task
behavioral1
Sample
4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212.dll
Resource
win10v2004-20240226-en
General
-
Target
4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212
-
Size
169KB
-
MD5
b7092df99ece1cdb458259e0408983c7
-
SHA1
576f9128dbc77d52234061c19afad7451d3a6181
-
SHA256
4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212
-
SHA512
0559506bc2bc11a69933f1511bba8961e72b904dc7845088bc313d521ee377176800f3e1fd82e0e48fab5b1efb015b4f76e801f90094e04c62ee088b68387fa2
-
SSDEEP
3072:munsNwziDuqhYe/tMv9Duc4gWU7vaptACtYhm:kSkuqS2tMRuTVe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212
Files
-
4281854f27a755ab51e71d951016ad10ff30a03cd612ba1b14c4d89d9b4be212.dll windows:6 windows x64 arch:x64
334009928d96c0357d9f78e0922cc011
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
SetHandleInformation
TerminateProcess
SetFileTime
CreatePipe
WaitForSingleObject
GetSystemDirectoryW
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
GetDiskFreeSpaceExW
Process32FirstW
GetSystemInfo
Module32FirstW
GetCurrentDirectoryW
GetFileSizeEx
GetProcAddress
GetFileSize
GetComputerNameW
CreateProcessW
GetModuleHandleW
FreeLibrary
GetTickCount
MoveFileW
GetProcessTimes
GetDriveTypeW
GetFileTime
FlushFileBuffers
GetExitCodeProcess
SetErrorMode
CreateThread
GetLogicalDrives
GetVolumeInformationW
FileTimeToDosDateTime
GetTempFileNameW
lstrcpyW
WideCharToMultiByte
LocalFree
FileTimeToLocalFileTime
CloseHandle
lstrcpyA
DeleteFileW
lstrcatW
GetLastError
GetFileInformationByHandle
MultiByteToWideChar
GetACP
GetFileAttributesW
CreateFileW
LocalAlloc
FindClose
GetTempPathW
SetFilePointer
lstrcpynW
WriteFile
lstrlenW
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
ReadFile
HeapSize
SetStdHandle
GetCommandLineW
GetCommandLineA
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
GetFileType
GetStdHandle
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
GetModuleFileNameW
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
advapi32
SystemFunction036
CryptDestroyHash
CryptHashData
CryptDeriveKey
CryptCreateHash
RegCloseKey
RegQueryValueExA
SetTokenInformation
ConvertStringSidToSidW
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
CreateProcessAsUserW
RegCreateKeyW
GetLengthSid
DuplicateTokenEx
LookupAccountSidW
RegQueryValueExW
GetTokenInformation
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptReleaseContext
cabinet
ord14
ord11
ord10
ord13
wininet
HttpOpenRequestW
HttpQueryInfoA
InternetQueryDataAvailable
InternetWriteFile
InternetOpenW
InternetCrackUrlW
HttpEndRequestW
HttpSendRequestExW
InternetConnectW
DeleteUrlCacheEntryW
InternetSetOptionW
InternetReadFile
HttpAddRequestHeadersW
InternetCloseHandle
urlmon
ObtainUserAgentString
wtsapi32
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateSessionsW
ws2_32
socket
gethostbyname
select
WSACleanup
setsockopt
ioctlsocket
htons
gethostname
connect
shutdown
send
WSAStartup
closesocket
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ