Static task
static1
Behavioral task
behavioral1
Sample
6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903.dll
Resource
win10v2004-20240419-en
General
-
Target
6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903
-
Size
100KB
-
MD5
a28805cdee979b26adab24d07de2fd78
-
SHA1
b3fcc922dc4508ddecd06f788fac16ae087077c9
-
SHA256
6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903
-
SHA512
143f9c01736cc2030208a3ab5cfe719759ef3c4fe77951a862bed2e1c83b8f9524776536aff8766c3bf27577440bcfb3432c8bcd5c47026a576af1292679066b
-
SSDEEP
1536:ZepH1TgwesnY7dYhmzTBSu+NT6KCC8r9ro28K2UemHHbRJu5:059esnY7QgkLCC8po28xlmHHtJu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903
Files
-
6cf378c4afdde0178760872721669257a1ea88141d9949cdfffdd09119a80903.dll windows:4 windows x86 arch:x86
8ff73f83d3a0faf6b5915bc4a56144c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetOEMCP
GetCPInfo
GetCommandLineA
RtlUnwind
HeapAlloc
RaiseException
HeapSize
HeapReAlloc
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ExitProcess
TerminateProcess
HeapFree
SetLastError
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
WriteFile
GetCurrentProcess
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
GetModuleHandleA
GetProcAddress
GetEnvironmentStrings
GetEnvironmentStringsW
lstrcmpA
lstrcmpiA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetCurrentThread
user32
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
RegisterWindowMessageA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
SystemParametersInfoA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
wsprintfA
SetWindowTextA
ClientToScreen
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetWindow
GetDlgCtrlID
GetWindowTextA
gdi32
DeleteObject
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
CreateBitmap
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
DeleteDC
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ