Behavioral task
behavioral1
Sample
4bb1ecb382f01a114961ad5d65930146a0102b3574bd47254148e09ada9f2a59.dll
Resource
win7-20240508-en
General
-
Target
4bb1ecb382f01a114961ad5d65930146a0102b3574bd47254148e09ada9f2a59
-
Size
60KB
-
MD5
0e1a178a080f12dccf5d77598160cbe3
-
SHA1
031d3c021db994f2f0339598a43db7add9975db4
-
SHA256
4bb1ecb382f01a114961ad5d65930146a0102b3574bd47254148e09ada9f2a59
-
SHA512
41974c2c7017a927c640f0693590076ab368def4e8e6bb412daf02f2f50fbfd2e9fffcd1ef622180c6efe8da4559955669b523b664ebd6931a5a00cc01b47aa9
-
SSDEEP
768:Bs+TgMsHPnI1bsb3+rpKZbRj2XCN/sJggWNGOmRLZYOJWVQTbZbr/2xn4/OMa6NO:W7vI1b43uKZFkJJWHkhZbr/451A9+/4
Malware Config
Signatures
-
Ramnit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4bb1ecb382f01a114961ad5d65930146a0102b3574bd47254148e09ada9f2a59
Files
-
4bb1ecb382f01a114961ad5d65930146a0102b3574bd47254148e09ada9f2a59.dll .vbs windows:4 windows x86 arch:x86 polyglot
7c2fc7258062a66936ef5905b4896c58
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
GetFileTime
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenMutexA
ReadFile
ReleaseMutex
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetThreadPriority
Sleep
TryEnterCriticalSection
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetDiskFreeSpaceExA
GetCurrentProcessId
GetCurrentProcess
FindNextFileA
FindFirstFileA
ExpandEnvironmentStringsA
FindClose
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateDirectoryA
LoadLibraryA
CloseHandle
ws2_32
recv
listen
ioctlsocket
inet_addr
select
getsockname
send
socket
getpeername
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
htons
user32
MessageBoxA
wsprintfA
GetDesktopWindow
GetDC
CharUpperBuffW
ExitWindowsEx
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
LookupPrivilegeValueA
shell32
ShellExecuteA
gdi32
CreateCompatibleDC
DeleteDC
DeleteObject
GdiFlush
GetDeviceCaps
SelectObject
SetStretchBltMode
StretchBlt
CreateDIBSection
ole32
CreateStreamOnHGlobal
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ