_ReflectiveLoader@4
Behavioral task
behavioral1
Sample
b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014.dll
Resource
win10v2004-20240426-en
General
-
Target
b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014.zip
-
Size
1.4MB
-
MD5
ff8c8e3a28c26973ae8b77b40f37800a
-
SHA1
6b1d4a791f5e1c4e9157a84ee9cb82b33f9777fe
-
SHA256
a272a3712811f17fb6214d5d7b397e47b03dcaae0b529108dcdc6c03308ef1d6
-
SHA512
aa63d13d485b8fac0cd0d55c2ed84c1453bcaac9471e956bb21220adb2091dc1bd5adee2030ead16355c07c7886d8d308321af14d56db80ae9adf859a1e06adc
-
SSDEEP
24576:0ONp5Y7QsriUweKzLkbUa88/BYrvKdS4pFN9bLl6RTwcEPG:/NpuQsr1weKzgLivKdl5/lKPEPG
Malware Config
Signatures
-
resource yara_rule static1/unpack001/b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014 vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014
Files
-
b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014.zip.zip
Password: infected
-
b8a7b6218c6b945c988ffcef76fd1f5da52a594d2c6097618ceacade00104014.dll windows:5 windows x86 arch:x86
Password: infected
626ec1b0fde69d582020565565b1b135
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReleaseMutex
GetCurrentProcessId
CreateThread
GetProcAddress
GetModuleHandleA
lstrcmpA
Process32First
CreateFileW
OpenMutexA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
GetTempPathA
DeleteFileA
SystemTimeToFileTime
GetTickCount
GetLocalTime
GetNativeSystemInfo
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
SetLastError
VirtualAlloc
LoadLibraryA
VirtualProtect
GetCommandLineA
CreateEventA
GetComputerNameA
GetCurrentProcess
MultiByteToWideChar
CreateDirectoryA
OutputDebugStringA
LocalFree
DeleteCriticalSection
HeapCreate
HeapDestroy
InterlockedCompareExchange
InterlockedIncrement
SwitchToThread
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnmapViewOfFile
GetCurrentThreadId
CreateIoCompletionPort
WaitForMultipleObjects
GetQueuedCompletionStatus
InterlockedExchangeAdd
CreateFileMappingA
MapViewOfFileEx
PostQueuedCompletionStatus
ResetEvent
SetEvent
CreateSemaphoreA
ReleaseSemaphore
SetEndOfFile
CreateMutexA
LockResource
TerminateProcess
SizeofResource
TerminateThread
WideCharToMultiByte
OpenProcess
WaitForSingleObject
LoadResource
FindResourceW
FindResourceExW
CloseHandle
GetFileSize
CreateFileA
GlobalFree
GetLastError
Sleep
WriteConsoleW
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
SetFilePointerEx
FreeEnvironmentStringsW
GlobalAlloc
LocalAlloc
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
SetFilePointer
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
ReadConsoleW
GetConsoleMode
ReadFile
GetModuleFileNameW
WriteFile
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
LoadLibraryExW
ExitThread
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
PostThreadMessageW
DispatchMessageA
MsgWaitForMultipleObjectsEx
wsprintfA
PeekMessageA
GetMessageW
TranslateMessage
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
ShellExecuteA
ole32
CoCreateGuid
shlwapi
StrChrA
StrPBrkA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
SendARP
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
DeleteUrlCacheEntryA
InternetOpenA
InternetCloseHandle
InternetSetOptionA
ws2_32
WSAEventSelect
ntohs
WSACreateEvent
WSAWaitForMultipleEvents
htons
setsockopt
socket
WSAStartup
ntohl
htonl
WSACleanup
gethostname
inet_ntoa
inet_addr
WSAGetLastError
gethostbyname
listen
send
WSAEnumNetworkEvents
bind
recv
connect
getsockopt
WSAGetOverlappedResult
WSASetLastError
WSAIoctl
WSAStringToAddressA
getaddrinfo
freeaddrinfo
WSAAddressToStringA
getsockname
ioctlsocket
shutdown
WSASend
WSARecv
closesocket
recvfrom
WSACloseEvent
sendto
WSAResetEvent
winmm
timeGetTime
urlmon
URLDownloadToCacheFileA
Exports
Exports
Sections
.text Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sign Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 620KB - Virtual size: 620KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 828KB - Virtual size: 828KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ