Static task
static1
Behavioral task
behavioral1
Sample
eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a.dll
Resource
win10v2004-20240226-en
General
-
Target
eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a
-
Size
329KB
-
MD5
7a889bb8883ffa8b168342e7a09e4414
-
SHA1
a6812016d9b15dae031044f0db41cec5f9755b40
-
SHA256
eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a
-
SHA512
de494148bc738ed7f4ae3ac7b44e422e9126cd305359227c2fa7340845b7e64fcf51a994a8341c2c56ca57bd863a10b4ea435fc6e358c2e9b3d9459b8a91a26a
-
SSDEEP
6144:smWicfSPyXTnkl+r+MHLt8TaggWQI9TXS0osu:smWip2TnGC+MHL2mgiIFXS0
Malware Config
Signatures
-
Detects executables referencing many IR and analysis tools 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_References_SecTools -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a
Files
-
eda1d601ef71d61b8d96fc25f9934e2c057db43a122e58ffaf84690c3fd64e4a.dll windows:5 windows x86 arch:x86
0ed688721285c2be667eedae4e00d1fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
crypt32
PFXExportCertStoreEx
CertOpenSystemStoreA
CertVerifyTimeValidity
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertGetCertificateContextProperty
CertGetNameStringA
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertDeleteCertificateFromStore
PFXIsPFXBlob
winscard
SCardReleaseContext
SCardListReadersA
SCardDisconnect
SCardFreeMemory
SCardEstablishContext
SCardConnectA
sensapi
IsNetworkAlive
iphlpapi
GetTcpTable
msvcrt
_except_handler3
memset
memcpy
isdigit
strtol
strstr
_strrev
strchr
_snprintf
_wcsicmp
isprint
fclose
fseek
realloc
fwrite
fread
fopen
strncpy
exit
sprintf
free
calloc
malloc
atoi
psapi
GetModuleFileNameExA
dnsapi
DnsFlushResolverCache
wininet
HttpQueryInfoA
HttpAddRequestHeadersW
HttpAddRequestHeadersA
InternetSetStatusCallback
InternetQueryOptionA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetCheckConnectionA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
ws2_32
ntohs
gethostbyname
closesocket
htons
inet_addr
WSASetLastError
WSAGetLastError
accept
listen
send
socket
bind
recv
shutdown
WSAStartup
inet_ntoa
connect
gethostname
getpeername
htonl
setsockopt
recvfrom
select
__WSAFDIsSet
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ord680
SHGetFolderPathA
ExtractIconExA
SHFileOperationA
shlwapi
PathAppendA
StrStrIA
PathIsDirectoryA
PathFileExistsA
PathFindFileNameA
PathAddBackslashA
StrStrIW
StrToIntA
StrChrIA
StrStrA
StrNCatA
StrCmpNIA
PathMakeSystemFolderA
ntdll
ZwOpenProcess
RtlCreateUserThread
RtlImageNtHeader
kernel32
FindNextFileW
lstrlenW
CreateFileW
FileTimeToSystemTime
FindFirstFileW
GetFileInformationByHandle
GetFileType
LocalAlloc
GetLocalTime
SystemTimeToFileTime
GetFileSize
FileTimeToDosDateTime
SwitchToThread
WriteProcessMemory
LocalFree
Module32Next
VirtualAllocEx
GetHandleInformation
Module32First
GetProcessTimes
CreateRemoteThread
VirtualFree
VirtualQuery
LoadLibraryA
GetPrivateProfileStringA
GetShortPathNameA
GetFileAttributesW
GetFileAttributesA
GetVersionExW
WideCharToMultiByte
VirtualProtect
GetThreadPriority
VirtualAlloc
InterlockedExchange
FlushInstructionCache
CloseHandle
lstrcmpA
TerminateThread
WinExec
MoveFileA
ExitThread
GetCommandLineW
HeapSize
HeapValidate
GetProcessHeap
GetCurrentDirectoryA
CopyFileA
GetLogicalDriveStringsA
SetCurrentDirectoryA
SetThreadPriority
GetDriveTypeA
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
GetLastError
SetLastError
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
IsDebuggerPresent
GetTickCount
GetVolumeInformationA
GetEnvironmentVariableA
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
Process32First
GetTimeFormatA
GetDateFormatA
OpenProcess
GetSystemWindowsDirectoryA
GetTimeZoneInformation
Process32Next
CreateToolhelp32Snapshot
WaitForSingleObject
LoadLibraryExA
ReleaseMutex
lstrcpynA
Sleep
GetTempFileNameA
WaitForMultipleObjects
GetTempPathA
GetSystemTime
CreateFileA
SetFilePointer
MoveFileExA
SetEndOfFile
SetFilePointerEx
UnlockFile
LockFile
WriteFile
IsBadWritePtr
ReadFile
CreateDirectoryA
GetFileSizeEx
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
FindClose
FindNextFileA
DeleteFileA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
SetErrorMode
SetEvent
OpenMutexA
lstrcpyA
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
CreateFileMappingA
GlobalLock
GlobalAlloc
CreateProcessA
MultiByteToWideChar
GlobalUnlock
GlobalFree
CreateThread
HeapCreate
lstrcmpiA
OpenEventA
lstrcmpiW
OpenFileMappingA
CreateMutexA
GetComputerNameA
lstrlenA
CreateEventA
GetVersionExA
ResetEvent
GetCommandLineA
InitializeCriticalSection
user32
GetWindow
DestroyIcon
FindWindowA
SetClipboardData
OpenClipboard
GetDesktopWindow
EmptyClipboard
GetIconInfo
RegisterWindowMessageA
SendMessageA
WindowFromPoint
DrawIcon
CreateDesktopA
GetTopWindow
CloseClipboard
SendMessageW
IsWindowVisible
IsWindow
GetShellWindow
PostMessageW
IsIconic
MapVirtualKeyW
IsRectEmpty
GetClassLongA
GetWindowThreadProcessId
MapWindowPoints
PostMessageA
GetMenuItemInfoA
SetWindowPos
SendMessageTimeoutA
GetWindowLongA
GetAncestor
GetWindowInfo
GetParent
GetWindowRect
GetSystemMenu
DefWindowProcW
EndMenu
HiliteMenuItem
DefMDIChildProcA
ReleaseDC
GetMenuItemCount
DefMDIChildProcW
DestroyCursor
DefWindowProcA
GetMenuState
CopyIcon
TrackPopupMenuEx
GetMenuItemRect
GetMenu
MenuItemFromPoint
GetSubMenu
SetKeyboardState
GetMenuItemID
OpenDesktopA
GetUserObjectInformationA
PrintWindow
WindowFromDC
SetLayeredWindowAttributes
EnumChildWindows
RedrawWindow
GetWindowRgn
SetClassLongA
SetWindowLongA
GetScrollBarInfo
MoveWindow
DialogBoxIndirectParamA
SetWindowTextA
ShowWindow
EndDialog
GetDlgItem
CreateWindowExA
GetWindowTextLengthA
GetClientRect
LoadIconA
AttachThreadInput
DestroyWindow
wsprintfA
PtInRect
GetFocus
RealChildWindowFromPoint
GetClassNameA
GetCursorPos
GetWindowTextW
GetOpenClipboardWindow
GetActiveWindow
GetWindowTextA
GetGUIThreadInfo
GetKeyboardState
ToAscii
FindWindowW
DispatchMessageW
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
GetWindowDC
GetThreadDesktop
SetThreadDesktop
SetCaretBlinkTime
GetDC
GetSystemMetrics
CharUpperA
GetCursor
GetLastActivePopup
gdi32
CreateFontIndirectA
GetObjectA
GetClipRgn
BitBlt
GetViewportOrgEx
SetViewportOrgEx
CreateCompatibleBitmap
OffsetRgn
GetDeviceCaps
DeleteDC
CreateDIBSection
GetDIBits
GdiFlush
DeleteObject
SelectClipRgn
CreateRectRgn
SelectObject
CreateCompatibleDC
advapi32
CryptGetKeyParam
RegSetValueExA
RegFlushKey
GetUserNameA
RegDeleteValueA
RegEnumKeyExA
RegNotifyChangeKeyValue
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
GetTokenInformation
SetNamedSecurityInfoA
OpenThreadToken
OpenProcessToken
CryptGetUserKey
RegOpenKeyA
RegCloseKey
ole32
CoCreateInstance
CoInitialize
oleaut32
VariantInit
SysAllocString
Sections
.text Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ