Static task
static1
Behavioral task
behavioral1
Sample
f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099.dll
Resource
win10v2004-20240426-en
General
-
Target
f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099
-
Size
162KB
-
MD5
4b3c2f4e296bf4ad5e0fdcd8093b683a
-
SHA1
959ae3e95400cb6aac7ca6827bc6c32670aeba43
-
SHA256
f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099
-
SHA512
e9c9d89871696cce1e56c035ced1a31c16b8f927fd61597c19029a039be9c54d161aa312827b80e12daf98db7c016b08ddd12248c292cd3af7fa9d321b83f0f2
-
SSDEEP
3072:0Iqb24vfMMoxXCITxnaSR0vPEb98evLKTBft52Brsi:0V24vfMMotCITxncnRWKTBl0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099
Files
-
f60e868a459c3856552a6105523a442eecc38d1d575aa57a111f670fdf7b2099.dll windows:4 windows x86 arch:x86
0f4527a9c5e94a621c25532738ae7fb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeConsole
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentVariableA
GetExitCodeThread
GetFileSize
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetTimeFormatA
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LockFileEx
MapViewOfFile
MultiByteToWideChar
FindNextFileA
OpenMutexA
OpenProcess
OpenThread
PeekNamedPipe
Process32First
Process32Next
ReadFile
ReadFileEx
ReadProcessMemory
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetEvent
SetFilePointer
SetLastError
SetNamedPipeHandleState
Sleep
SuspendThread
TerminateThread
Thread32First
Thread32Next
UnlockFileEx
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
WaitForSingleObject
WaitForSingleObjectEx
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleA
WriteFile
WriteFileEx
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpyW
lstrlenA
lstrlenW
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
EnterCriticalSection
DisconnectNamedPipe
DeleteFileA
DeleteCriticalSection
CreateToolhelp32Snapshot
CreateThread
CreateRemoteThread
CreateProcessA
CreateNamedPipeA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
ConnectNamedPipe
CompareStringW
CloseHandle
OpenFileMappingA
AllocConsole
advapi32
RegQueryValueExA
GetUserNameA
GetUserNameW
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
AdjustTokenPrivileges
user32
LoadCursorA
GetWindowRect
GetWindowDC
GetKeyboardState
ToUnicode
ExitWindowsEx
DrawTextA
DrawIcon
CharUpperBuffW
CharUpperBuffA
wsprintfA
GetIconInfo
ReleaseDC
gdi32
StretchBlt
SetTextColor
SetStretchBltMode
SetBkColor
SelectObject
GdiFlush
DeleteObject
DeleteDC
CreateCompatibleDC
CreateDIBSection
ole32
CreateStreamOnHGlobal
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ