Behavioral task
behavioral1
Sample
71b4e07ed0de00024bf5f8bc290226e9d78ba67a542f4dd1a2fbaf622cf8c2aa.dll
Resource
win7-20240221-en
General
-
Target
71b4e07ed0de00024bf5f8bc290226e9d78ba67a542f4dd1a2fbaf622cf8c2aa
-
Size
68KB
-
MD5
7ca43c2ba50771ae56043c7b63903f7c
-
SHA1
d8711c1f01bb0005514cb5d940a2f6d8cfa55c7a
-
SHA256
71b4e07ed0de00024bf5f8bc290226e9d78ba67a542f4dd1a2fbaf622cf8c2aa
-
SHA512
a07eaf36ffca89d154ef5c3d61cc60958ba94a04739c5b9e015b521a1c51ef2b5d6c918deabdb4be206e6dbcbcf5b244395a2594172cdcdf7f68480da333c3c1
-
SSDEEP
1536:MLNd/Pk7btaoX7DypKr0wNUYIUSS9eyBUbW0iZs3S:GNhY5aora80mUYI7DbWXs3
Malware Config
Signatures
-
Ramnit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71b4e07ed0de00024bf5f8bc290226e9d78ba67a542f4dd1a2fbaf622cf8c2aa
Files
-
71b4e07ed0de00024bf5f8bc290226e9d78ba67a542f4dd1a2fbaf622cf8c2aa.dll .vbs windows:4 windows x86 arch:x86 polyglot
62a7616cac5efe94334afe90464544ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
GetCurrentProcess
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
MoveFileA
MultiByteToWideChar
OpenFileMappingA
OpenMutexA
ReadFile
ReleaseMutex
RemoveDirectoryA
ResumeThread
RtlMoveMemory
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetThreadPriority
Sleep
TryEnterCriticalSection
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
ExitProcess
EnterCriticalSection
DeleteCriticalSection
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
InitializeCriticalSection
CloseHandle
ws2_32
recv
listen
ioctlsocket
inet_addr
select
getsockname
send
socket
getpeername
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
htons
user32
GetDC
ExitWindowsEx
CharUpperBuffW
MessageBoxA
GetDesktopWindow
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
LookupPrivilegeValueA
shell32
ShellExecuteA
gdi32
CreateCompatibleDC
DeleteDC
DeleteObject
GdiFlush
GetDeviceCaps
SelectObject
SetStretchBltMode
StretchBlt
CreateDIBSection
ole32
CreateStreamOnHGlobal
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ