Static task
static1
Behavioral task
behavioral1
Sample
60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714.dll
Resource
win10v2004-20240508-en
General
-
Target
60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714
-
Size
327KB
-
MD5
2c362b2ce137a8bb2b7fe03edadcd118
-
SHA1
da5b9e47ff862c8830148821a69ff4c5557481b7
-
SHA256
60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714
-
SHA512
f8a5ada2e1222aef5847880d87364237c7a8bb5b608fec85774d76e8968a7a6c9ed20b650e1afe95b50b17625206d72e64150ad698d3733ec5fd06e295107c8d
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714
Files
-
60e804e4c7942b94dfd5e71881a6b4d13ac6fd108291101fc9dd4533a7b02714.dll windows:5 windows x86 arch:x86
9359562ed14a4ae6cd1b155989ded1e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winscard
SCardDisconnect
SCardListReadersA
SCardEstablishContext
SCardConnectA
SCardFreeMemory
SCardReleaseContext
sensapi
IsNetworkAlive
iphlpapi
GetTcpTable
dbghelp
MiniDumpWriteDump
msvcrt
strchr
isprint
fclose
fseek
realloc
fwrite
fread
fopen
_except_handler3
strncpy
sprintf
atoi
isdigit
strtol
_strrev
_snprintf
exit
malloc
calloc
free
strstr
memcpy
memset
psapi
GetModuleFileNameExA
netapi32
NetQueryDisplayInformation
NetApiBufferFree
dnsapi
DnsFlushResolverCache
wininet
HttpQueryInfoA
HttpAddRequestHeadersW
HttpAddRequestHeadersA
InternetSetStatusCallback
InternetQueryOptionA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetCheckConnectionA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
ws2_32
accept
WSAGetLastError
WSASetLastError
inet_addr
htons
closesocket
gethostbyname
ntohs
listen
send
socket
bind
recv
shutdown
WSAStartup
inet_ntoa
connect
gethostname
getpeername
htonl
setsockopt
select
__WSAFDIsSet
recvfrom
shell32
ord680
ShellExecuteA
ExtractIconExA
SHFileOperationA
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
StrStrIW
StrToIntA
PathFileExistsA
StrStrIA
PathMakeSystemFolderA
PathAppendA
StrCmpNIA
StrNCatA
StrStrA
PathFindFileNameA
StrChrIA
PathAddBackslashA
ntdll
RtlCreateUserThread
RtlImageNtHeader
kernel32
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
GetDriveTypeA
SetThreadPriority
SetCurrentDirectoryA
GetLogicalDriveStringsA
CopyFileA
GetProcessHeap
HeapValidate
HeapSize
GetCommandLineA
ExitThread
MoveFileA
WinExec
TerminateThread
FindNextChangeNotification
FindFirstChangeNotificationA
lstrcmpA
CloseHandle
FlushInstructionCache
InterlockedExchange
VirtualAlloc
GetThreadPriority
VirtualProtect
WideCharToMultiByte
GetCommandLineW
GetVersionExA
GetVersionExW
GetFileAttributesA
ResetEvent
GetCurrentDirectoryA
FindNextFileW
lstrlenW
CreateFileW
FileTimeToSystemTime
FindFirstFileW
GetFileInformationByHandle
GetFileType
LocalAlloc
GetLocalTime
SystemTimeToFileTime
GetFileSize
FileTimeToDosDateTime
SwitchToThread
WriteProcessMemory
LocalFree
Module32Next
LoadLibraryA
VirtualAllocEx
GetHandleInformation
Module32First
GetProcessTimes
CreateRemoteThread
VirtualFree
VirtualQuery
GetPrivateProfileStringA
GetShortPathNameA
GetVolumeInformationA
GetSystemWindowsDirectoryA
GetModuleFileNameA
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
IsDebuggerPresent
GetTickCount
GetEnvironmentVariableA
GetCurrentProcess
AddVectoredExceptionHandler
GetCurrentThreadId
GetCurrentProcessId
GetSystemDefaultLangID
Process32First
GetTimeFormatA
GetDateFormatA
OpenProcess
GetTimeZoneInformation
Process32Next
CreateToolhelp32Snapshot
WaitForSingleObject
LoadLibraryExA
ReleaseMutex
lstrcpynA
Sleep
GetTempFileNameA
WaitForMultipleObjects
GetTempPathA
GetSystemTime
CreateFileA
SetFilePointer
MoveFileExA
SetEndOfFile
SetFilePointerEx
UnlockFile
LockFile
WriteFile
IsBadWritePtr
ReadFile
CreateDirectoryA
GetFileSizeEx
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
FindClose
FindNextFileA
DeleteFileA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
SetErrorMode
SetEvent
OpenMutexA
lstrcpyA
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
CreateFileMappingA
GlobalLock
GlobalAlloc
CreateProcessA
MultiByteToWideChar
GlobalUnlock
GlobalFree
CreateThread
HeapCreate
lstrcmpiA
OpenEventA
lstrcmpiW
OpenFileMappingA
CreateMutexA
GetComputerNameA
lstrlenA
CreateEventA
GetFileAttributesW
user32
CharUpperA
FindWindowA
GetSystemMetrics
GetDC
SetCaretBlinkTime
SetThreadDesktop
GetThreadDesktop
ReleaseDC
GetShellWindow
GetWindow
DestroyIcon
SetClipboardData
OpenClipboard
GetDesktopWindow
EmptyClipboard
GetIconInfo
RegisterWindowMessageA
SendMessageA
WindowFromPoint
DrawIcon
CreateDesktopA
GetTopWindow
CloseClipboard
SendMessageW
IsWindowVisible
IsWindow
GetLastActivePopup
PostMessageW
IsIconic
MapVirtualKeyW
IsRectEmpty
GetClassLongA
GetWindowThreadProcessId
MapWindowPoints
PostMessageA
GetMenuItemInfoA
SetWindowPos
SendMessageTimeoutA
GetWindowLongA
GetAncestor
GetWindowInfo
GetParent
GetWindowRect
GetSystemMenu
DefWindowProcW
EndMenu
HiliteMenuItem
DefMDIChildProcA
GetCursor
GetMenuItemCount
DefMDIChildProcW
DestroyCursor
DefWindowProcA
GetMenuState
CopyIcon
TrackPopupMenuEx
GetMenuItemRect
GetMenu
MenuItemFromPoint
GetSubMenu
SetKeyboardState
GetMenuItemID
OpenDesktopA
PrintWindow
WindowFromDC
SetLayeredWindowAttributes
EnumChildWindows
RedrawWindow
GetWindowRgn
SetClassLongA
SetWindowLongA
GetScrollBarInfo
MoveWindow
DialogBoxIndirectParamA
SetWindowTextA
ShowWindow
EndDialog
GetDlgItem
CreateWindowExA
GetWindowTextLengthA
GetClientRect
LoadIconA
AttachThreadInput
DestroyWindow
wsprintfA
PtInRect
GetFocus
RealChildWindowFromPoint
GetClassNameA
GetCursorPos
GetWindowTextW
GetOpenClipboardWindow
GetActiveWindow
GetWindowTextA
GetGUIThreadInfo
GetKeyboardState
ToAscii
FindWindowW
DispatchMessageW
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
GetWindowDC
GetUserObjectInformationA
gdi32
GetClipRgn
BitBlt
GetViewportOrgEx
SetViewportOrgEx
SelectClipRgn
GetObjectA
CreateRectRgn
DeleteDC
CreateDIBSection
GetDIBits
GdiFlush
OffsetRgn
CreateCompatibleBitmap
DeleteObject
SelectObject
CreateCompatibleDC
CreateFontIndirectA
GetDeviceCaps
advapi32
GetTokenInformation
OpenProcessToken
RegDeleteKeyA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteValueA
RegFlushKey
RegSetValueExA
RegCloseKey
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ