Static task
static1
Behavioral task
behavioral1
Sample
d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d.dll
Resource
win10v2004-20240226-en
General
-
Target
d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d
-
Size
169KB
-
MD5
8e302b5747ff1dcad301c136e9acb4b0
-
SHA1
9b6c0ebeb319a7ed27c12e2a38fbf3b1bbe569ee
-
SHA256
d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d
-
SHA512
cda4d4ca7e60143de664686a4f0e18e713d49c61123c08c1f705cd2b14a672fb43b799933a0ce2e03850f60acc980f940a4577fd709aa250ae65c906abd9fb4c
-
SSDEEP
3072:munsNwziDuqhYe/tMv9Duc42WU7vaptACtY0I:kSkuqS2tMRuTv3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d
Files
-
d178cced92bbce22d2214dbdd3db0491f1c352d21634fda9abd08d720faca84d.dll windows:6 windows x64 arch:x64
334009928d96c0357d9f78e0922cc011
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
SetHandleInformation
TerminateProcess
SetFileTime
CreatePipe
WaitForSingleObject
GetSystemDirectoryW
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
GetDiskFreeSpaceExW
Process32FirstW
GetSystemInfo
Module32FirstW
GetCurrentDirectoryW
GetFileSizeEx
GetProcAddress
GetFileSize
GetComputerNameW
CreateProcessW
GetModuleHandleW
FreeLibrary
GetTickCount
MoveFileW
GetProcessTimes
GetDriveTypeW
GetFileTime
FlushFileBuffers
GetExitCodeProcess
SetErrorMode
CreateThread
GetLogicalDrives
GetVolumeInformationW
FileTimeToDosDateTime
GetTempFileNameW
lstrcpyW
WideCharToMultiByte
LocalFree
FileTimeToLocalFileTime
CloseHandle
lstrcpyA
DeleteFileW
lstrcatW
GetLastError
GetFileInformationByHandle
MultiByteToWideChar
GetACP
GetFileAttributesW
CreateFileW
LocalAlloc
FindClose
GetTempPathW
SetFilePointer
lstrcpynW
WriteFile
lstrlenW
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
ReadFile
HeapSize
SetStdHandle
GetCommandLineW
GetCommandLineA
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
GetFileType
GetStdHandle
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
GetModuleFileNameW
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
advapi32
SystemFunction036
CryptDestroyHash
CryptHashData
CryptDeriveKey
CryptCreateHash
RegCloseKey
RegQueryValueExA
SetTokenInformation
ConvertStringSidToSidW
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
CreateProcessAsUserW
RegCreateKeyW
GetLengthSid
DuplicateTokenEx
LookupAccountSidW
RegQueryValueExW
GetTokenInformation
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptReleaseContext
cabinet
ord14
ord11
ord10
ord13
wininet
HttpOpenRequestW
HttpQueryInfoA
InternetQueryDataAvailable
InternetWriteFile
InternetOpenW
InternetCrackUrlW
HttpEndRequestW
HttpSendRequestExW
InternetConnectW
DeleteUrlCacheEntryW
InternetSetOptionW
InternetReadFile
HttpAddRequestHeadersW
InternetCloseHandle
urlmon
ObtainUserAgentString
wtsapi32
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateSessionsW
ws2_32
socket
gethostbyname
select
WSACleanup
setsockopt
ioctlsocket
htons
gethostname
connect
shutdown
send
WSAStartup
closesocket
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ