test1
Static task
static1
Behavioral task
behavioral1
Sample
b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05.dll
Resource
win10v2004-20240412-en
General
-
Target
b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05
-
Size
2.2MB
-
MD5
3523e09ee03003de740231c9bd524993
-
SHA1
c1d4466534699bb4cb51da30b66b3c534b53d7aa
-
SHA256
b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05
-
SHA512
3f2922d54b4d6c4235a43ee3e1dd17e707e0d7432b1e816edf5d76e993b481c1be2446a65d10bd7a5482445923839006a93dea7901439f00dd69730d98b43fdd
-
SSDEEP
49152:CEQ/QfgTmpl0BXAAkVFUrj1YRkRXqrLFyjnar:CEQ/0fl0BXAZFimaXw8na
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05
Files
-
b225019290a5b9a1dfc31a7915396d67c6f47bba31931e044132b7dafbc3ff05.dll windows:4 windows x86 arch:x86
974213d1396764a367130e7d33c30e16
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
WriteProcessMemory
WriteFile
lstrlenA
GetModuleFileNameA
GetSystemInfo
FindClose
FindFirstFileA
lstrcpyA
LoadLibraryExA
lstrcpynA
GetSystemTime
GetLocalTime
ReadFile
SetFilePointer
GetFileSize
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
WaitForSingleObject
CreateProcessA
GetTempPathA
GetSystemDirectoryA
LocalFree
GlobalUnlock
LocalLock
GlobalAlloc
DeviceIoControl
ReleaseSemaphore
CreateSemaphoreA
GetPrivateProfileStringA
GetCurrentProcess
VirtualProtectEx
GetTickCount
VirtualAlloc
VirtualFree
GetVersionExA
lstrcatA
FreeLibrary
GetCurrentProcessId
OpenProcess
CreateFileA
GetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
CloseHandle
TerminateProcess
QueryPerformanceCounter
GlobalMemoryStatus
GetStdHandle
GetFileType
GetCurrentThreadId
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
GetDesktopWindow
advapi32
RegEnumKeyExA
ReportEventA
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
RegisterEventSourceA
netapi32
Netbios
msvcrt
malloc
_except_handler3
atol
fclose
fread
fopen
_ltoa
_stricmp
_pctype
__mb_cur_max
_isctype
realloc
memchr
fwrite
fflush
_setmode
ftell
fseek
fgets
abort
wcsstr
_vsnprintf
vfprintf
_iob
strcmp
qsort
fprintf
_initterm
_adjust_fdiv
free
_strnicmp
mktime
localtime
__CxxFrameHandler
time
rand
memmove
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
srand
_fileno
Exports
Exports
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 980KB - Virtual size: 977KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 852KB - Virtual size: 893KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ