DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
Static task
static1
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Run-Malware-1.bat
Resource
win11-20240426-en
Target
Malware-1.zip
Size
71KB
MD5
8ef9b0d77ed7b6a84012467b96c559eb
SHA1
c7f92ae217f316d1c1ea8a18adc49923aaaf7f6c
SHA256
d00a4b8c1cc96e265a9ddadbba1ad86a11d52bc4152861f074a52d7ecdd127d9
SHA512
ae0a350b8e031921bdac8add7ecd00bcb3340e7f8edfa994d32d885ca9580ea769ad812f1624bd31dae26646b304383db6aad909751ca56ae71e2603d6ce5cdd
SSDEEP
1536:yfUcvdGKbdAi0b9HQl26Kw2kxFkmb/UFR9StFjbmCe2F4t0BEJMK:yfUcv3ai0ml26Kw2kxFZIFX9Ce2F47z
Checks for missing Authenticode signature.
resource |
---|
unpack001/RtlCpl.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
LoadLibraryW
CloseHandle
Sleep
CreateThread
GetLastError
SetLastError
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
DeleteFileW
GetVolumeInformationW
ReadFile
SetFilePointer
WriteFile
SetHandleInformation
CreatePipe
GetCommandLineW
WaitForSingleObject
CreateMutexW
TerminateProcess
CreateProcessW
GlobalMemoryStatusEx
GetTickCount
GetComputerNameExW
GetModuleFileNameW
CopyFileW
GetComputerNameW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetSystemInfo
FindNextFileW
FindFirstFileW
PeekNamedPipe
RaiseException
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
SetStdHandle
HeapSize
FindClose
SystemFunction036
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CommandLineToArgvW
SHGetFolderPathW
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
gethostname
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ