SparkEntryPoint
Static task
static1
Behavioral task
behavioral1
Sample
51f3cce432dd089157596da00e36f4c1a6665c2db8e560362decce68490318f0.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
51f3cce432dd089157596da00e36f4c1a6665c2db8e560362decce68490318f0.dll
Resource
win10v2004-20240508-en
General
-
Target
a46856b95aedac82c4ec58a751664b3d.bin
-
Size
44KB
-
MD5
4935e977cbf687f3d61f2d2394f22bf3
-
SHA1
2a202dcad586d54149531db1cd6807fc6e358ed1
-
SHA256
713b958bf1ff22729b163988b7a67c6e4da1b8a768f8f8860d42a50fe62cf288
-
SHA512
c97da94b6cf03f0ae2572bf6aa23ee49afc98143600e3af3d36bf09b7479dc20212e714f4c78def2bfcea482455c3cc9609288bebf50fc6181452a31bb47ca3c
-
SSDEEP
768:Up1AajL1IwnYMTMyaTE74NvR1H/sGoadpBTlWUeGzV9CVC0sTLH3EruaLstTp4HV:01AajRDnYMTIjD7Td7eUl0sTTErVLGc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/51f3cce432dd089157596da00e36f4c1a6665c2db8e560362decce68490318f0.dll
Files
-
a46856b95aedac82c4ec58a751664b3d.bin.zip
Password: infected
-
51f3cce432dd089157596da00e36f4c1a6665c2db8e560362decce68490318f0.dll.dll windows:6 windows x86 arch:x86
Password: infected
0986ee100b9277b4d1503d41cc8367e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetCurrentProcess
CreateMutexA
LocalAlloc
Sleep
GetLastError
CreateFileA
LoadLibraryA
CloseHandle
K32GetModuleInformation
VirtualProtect
VirtualAllocEx
LocalFree
GetFileSize
ExitProcess
ReadProcessMemory
GetProcessHeap
FreeLibrary
K32EnumProcessModules
GetComputerNameA
WriteConsoleW
WriteProcessMemory
GetModuleFileNameA
HeapAlloc
ReadFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetModuleHandleExW
GetModuleFileNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
DecodePointer
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ