DllMain
Static task
static1
Behavioral task
behavioral1
Sample
aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558.dll
Resource
win10v2004-20240426-en
General
-
Target
17611026749.zip
-
Size
3.1MB
-
MD5
65d3f925572be663d7e30060e5a689e8
-
SHA1
eec6c79715c7aec0fe66d33c7884ebce933d89ec
-
SHA256
2d77acd4c7b1cbea6844c312ada0d9b01f56a75fc240fd11a992df2011c8be92
-
SHA512
9e96a0bc52a53c43a0ae6cc35109d63aa0a3b996147c3bcf2f170eb9b316ecb486b1dd56fe13d7dc62741cbf12785a844bee87f6015f7a01a049faad4a52ef6e
-
SSDEEP
98304:NNp1gi/B9dz0yTXU6DsuK+M3KMIO6VWi1L0ky:NNpqi/B3Jx12KPOkG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558
Files
-
17611026749.zip.zip
Password: infected
-
aa0772fc6784799d59649654879c2b4a23919cda410bede0162751e6d6d6b558.dll windows:4 windows x86 arch:x86
fb185b1745e58ae7bbd037ee4e31786b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CreateSemaphoreW
DeleteCriticalSection
EnterCriticalSection
GetModuleHandleW
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
ReleaseSemaphore
VirtualQuery
WideCharToMultiByte
AcquireSRWLockExclusive
AcquireSRWLockShared
CloseHandle
CreateFileMappingA
CreateFileW
CreateMutexA
CreateToolhelp32Snapshot
DuplicateHandle
FreeLibrary
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetEnvironmentVariableW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
GetStdHandle
GetThreadLocale
HeapAlloc
HeapFree
HeapReAlloc
InitOnceBeginInitialize
InitOnceComplete
IsBadReadPtr
LoadLibraryA
MapViewOfFile
Module32FirstW
Module32NextW
MultiByteToWideChar
ReleaseMutex
ReleaseSRWLockExclusive
ReleaseSRWLockShared
RtlCaptureContext
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WaitForSingleObjectEx
WriteConsoleW
lstrlenA
msvcrt
__mb_cur_max
_amsg_exit
_errno
_initterm
_iob
_lock
_unlock
_wcsnicmp
abort
atoi
bsearch
calloc
fputc
free
fwrite
localeconv
malloc
mbstowcs
memcmp
memcpy
memmove
memset
qsort
realloc
setlocale
strchr
strcmp
strerror
strlen
strncmp
strtol
vfprintf
wcslen
wcstombs
ntdll
NtWriteFile
RtlNtStatusToDosError
Exports
Exports
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ