FindFrame
Static task
static1
Behavioral task
behavioral1
Sample
fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25.dll
Resource
win10v2004-20240508-en
General
-
Target
fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25
-
Size
236KB
-
MD5
59789d35334b506a8361f5f792454db6
-
SHA1
7de1a9a5d877edd4747946c0ca345badf69298f7
-
SHA256
fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25
-
SHA512
300590b4ca6608cbefc7291d63a4c0f9059808d5e6e16de74656c18aa8e482537eb46d03ac4450d3bdf93590175ae7735c8c4e3267d72dbd922743cfcb5b0e79
-
SSDEEP
6144:8uyh302LCj31sY3sf4i3qDiUEvm234kxq/YKsrEsr:8Rx0X31h3sgi3Iidvmq7Ksr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25
Files
-
fc88f8184bb5910b7bb826b6990cdd1e6625a553d006513114223a62c8b47e25.dll windows:0 windows x86 arch:x86
582fc6cd75930621bd7dea7257d082a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord6059
ord389
ord3229
ord5204
ord5808
ord500
ord772
ord540
ord800
ord5356
ord690
ord1988
ord823
msvcrt
rand
strchr
strncpy
sscanf
__CxxFrameHandler
wcscat
memcpy
malloc
free
_strnicmp
strcpy
srand
memcmp
_stricmp
strrchr
strcat
time
localtime
strftime
vsprintf
sprintf
strlen
memset
atoi
strcspn
strstr
_except_handler3
_CxxThrowException
tolower
toupper
strcmp
wcscpy
strncat
calloc
_mbsstr
_mbsnbcpy
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_memicmp
kernel32
CreateToolhelp32Snapshot
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
FormatMessageA
CreateProcessA
GetLocalTime
VirtualQuery
lstrcatA
DeviceIoControl
SetFileAttributesA
MoveFileA
LocalFree
Process32First
lstrcmpiA
DebugActiveProcess
Process32Next
ExpandEnvironmentStringsA
GetModuleHandleA
InterlockedIncrement
CopyFileA
InterlockedExchange
CreateMutexA
ReleaseMutex
SetLastError
GetLastError
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
TerminateThread
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
DuplicateHandle
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetSystemDirectoryA
WinExec
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
wsprintfA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
RegQueryInfoKeyA
RegEnumValueA
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
ws2_32
inet_addr
htonl
sendto
closesocket
WSACleanup
send
__WSAFDIsSet
recv
connect
setsockopt
WSAIoctl
WSAStartup
socket
htons
ntohs
bind
ioctlsocket
select
recvfrom
WSAGetLastError
shlwapi
PathIsDirectoryA
PathFileExistsA
StrStrIA
ntdll
NtQueryInformationFile
NtQuerySystemInformation
psapi
GetModuleFileNameExA
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoInitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SysAllocStringByteLen
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantInit
SysStringLen
VariantClear
msvcp60
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
netapi32
Netbios
Exports
Exports
Sections
.text Size: - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fes0 Size: - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fes1 Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ