Static task
static1
Behavioral task
behavioral1
Sample
8cde646991bf48da49995c20333862bf182e961a12043a46a3fc64927a6ea935.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8cde646991bf48da49995c20333862bf182e961a12043a46a3fc64927a6ea935.dll
Resource
win10v2004-20240426-en
General
-
Target
a61648ce7a987bad9d27047df7a087ba.bin
-
Size
3.1MB
-
MD5
373055f5c21c5d83c1a9383bea1d5004
-
SHA1
8c4ca06e819b342aa4c3916f1f6ae4d89bee3f0f
-
SHA256
981539507fdf2082c77eb761706f13bde7664deb3e19a0f963d8b2665de22271
-
SHA512
819715febb946224e2ea68b530b427cc719a16ba5fe91ef5807e05aaf8d619088077eaa3996ab406437bf7a9fa944ba5fac215b62c0f441f1f610b1b5f70d6e0
-
SSDEEP
98304:SIk4NQbFEDNCalPMbXMtfybVou5i9fW+CWrcjyI9w1R:S9isalPMb8tfyhociBX6l9w/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8cde646991bf48da49995c20333862bf182e961a12043a46a3fc64927a6ea935.exe
Files
-
a61648ce7a987bad9d27047df7a087ba.bin.zip
Password: infected
-
8cde646991bf48da49995c20333862bf182e961a12043a46a3fc64927a6ea935.exe.dll windows:6 windows x64 arch:x64
Password: infected
16501c0300b7c927fef8c2b68dfda984
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
FreeLibrary
GetLocaleInfoA
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
HeapAlloc
GetThreadContext
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
GlobalAlloc
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TerminateProcess
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
WideCharToMultiByte
GetProcAddress
GetTickCount64
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
InterlockedFlushSList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
CreateFileW
PeekNamedPipe
WriteFile
GetFileType
ReadFile
GetFileInformationByHandleEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
LocalFree
FormatMessageA
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
RtlUnwind
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SendInput
GetCursorPos
SetWindowLongPtrA
SendMessageA
GetForegroundWindow
WindowFromDC
CallWindowProcA
GetAsyncKeyState
WindowFromPoint
ScreenToClient
PostMessageA
GetWindowRect
GetKeyState
GetMessageExtraInfo
LoadCursorA
GetCapture
ClientToScreen
TrackMouseEvent
GetKeyboardLayout
SetCapture
SetCursor
GetClientRect
SetClipboardData
IsWindowUnicode
ReleaseCapture
SetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
keybd_event
advapi32
RegCreateKeyExW
RegSetValueExW
RegCloseKey
GetCurrentHwProfileA
shell32
ShellExecuteA
ShellExecuteExW
opengl32
glColor3f
glBlendFunc
glLoadIdentity
glPopMatrix
glPolygonOffset
glPopAttrib
glEnable
glVertex3f
glDepthMask
glLoadMatrixf
glEnd
glMatrixMode
glHint
glPushAttrib
glShadeModel
glGetFloatv
glPushMatrix
glDisable
glColor4f
glScaled
glVertex3d
glTranslatef
glBegin
glAlphaFunc
glLineWidth
winmm
PlaySoundA
ws2_32
htons
recv
closesocket
inet_pton
send
connect
socket
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
Sections
.text Size: - Virtual size: 794KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 762KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
."So Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Df? Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.<)t Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ