unload
Static task
static1
Behavioral task
behavioral1
Sample
ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc.dll
Resource
win10v2004-20240426-en
General
-
Target
ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc
-
Size
206KB
-
MD5
3bf2a55967d7b927be133af983cce2a7
-
SHA1
f83848805b0f2aa41696fec2e838eaa01e460d4a
-
SHA256
ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc
-
SHA512
ae69e06e59224eb35a6a4cb77d85d2cc95a42e5153c8e2a0d83507518db59505fa6743886591a728cc154cdd09e6ea09905c013e38e27cbf8693921ea398bc9f
-
SSDEEP
6144:1erG0lEsBYoz4A0RmM4ATeEA0FlgqN9An:PXGaA0XiV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc
Files
-
ebc3b2f27d11c7b12a7661ec9c39e1ced50caeefd0366a78516d5e6d676d2efc.dll windows:6 windows x64 arch:x64
8ef35458efb054af4e5045d1fbace89e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
FreeLibrary
VirtualProtect
HeapCreate
GetProcessHeap
CreateThread
DisableThreadLibraryCalls
GetModuleHandleA
GetTickCount64
GetProcAddress
Sleep
FreeLibraryAndExitThread
GetModuleFileNameA
GetCurrentDirectoryA
CreateDirectoryA
CreateFileA
DeleteFileA
ReadFile
WriteFile
CloseHandle
GetLastError
FreeResource
LoadResource
LockResource
SizeofResource
FindResourceA
VirtualAlloc
VirtualFree
VirtualQuery
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
GetModuleHandleW
InitializeSListHead
GetSystemTimeAsFileTime
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetSystemInfo
IsDebuggerPresent
FlushInstructionCache
RaiseException
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TerminateProcess
QueryPerformanceCounter
user32
DefWindowProcA
DestroyWindow
UnregisterClassA
MessageBoxA
RegisterClassExA
CreateWindowExA
shell32
ShellExecuteA
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
urlmon
URLOpenBlockingStreamA
vcruntime140
memchr
memcpy
__std_exception_copy
strstr
memset
memmove
__C_specific_handler
__current_exception
__current_exception_context
__C_specific_handler_noexcept
__std_type_info_destroy_list
memcmp
__vcrt_GetModuleFileNameW
__vcrt_LoadLibraryExW
_CxxThrowException
__std_exception_destroy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_cexit
_crt_atexit
_execute_onexit_table
_initterm
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_initterm_e
terminate
_register_onexit_function
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0
tolower
strcat_s
strcpy_s
strncpy_s
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__stdio_common_vsprintf_s
__stdio_common_vsprintf
__stdio_common_vsscanf
__acrt_iob_func
api-ms-win-crt-heap-l1-1-0
free
_callnewh
calloc
malloc
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-math-l1-1-0
ceilf
api-ms-win-crt-utility-l1-1-0
qsort
Exports
Exports
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ