St
Static task
static1
Behavioral task
behavioral1
Sample
e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1.dll
Resource
win10v2004-20240426-en
General
-
Target
e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1
-
Size
64KB
-
MD5
84006002caeaa5aef270d2fe22bb9b04
-
SHA1
380cff93a5302821dcaa5baef34c85c857453a97
-
SHA256
e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1
-
SHA512
879094e0b6cad8091907fcbf5fd5322520ed4f6a418e99d4140d143168401c671fa31931e71cad03b976fffc7c9f16ca623ff5304035731f0f024b195257c2e2
-
SSDEEP
768:fZNBplPG7qLI6nYpmFlglDWd18eRvKWzHSngsidhfIRbFlWaaqAFbBv:D/oRDWNvKWzmydcb/EVBv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1
Files
-
e66d6be2bbde33037462f1570b7a2f08a78f113c9506aa0b65f3ab710c347cd1.dll windows:4 windows x86 arch:x86
9272497d7204d7286fe5b5d0c1c7c18b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord4129
ord940
ord858
ord537
ord941
ord803
ord543
ord3584
ord540
ord800
ord2818
ord2614
ord860
ord354
ord5186
ord3318
ord825
ord5773
ord5442
ord1979
ord665
ord823
msvcrt
_adjust_fdiv
_initterm
_onexit
_itoa
_strcmpi
strstr
_strlwr
free
wcscmp
malloc
atoi
strchr
_except_handler3
_mbscmp
__dllonexit
sprintf
kernel32
GetCurrentDirectoryA
GetWindowsDirectoryA
CopyFileA
DeleteFileA
MoveFileExA
CreateToolhelp32Snapshot
CreateThread
OpenProcess
TerminateProcess
lstrcmpiA
Process32Next
LeaveCriticalSection
EnterCriticalSection
GetPrivateProfileStringA
GetModuleFileNameA
MultiByteToWideChar
GetSystemDirectoryA
TerminateThread
IsBadReadPtr
WaitForSingleObject
ExitThread
Process32First
GetCurrentProcess
WinExec
GetTempPathA
GetModuleHandleA
VirtualAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
WriteFile
SetFilePointer
ReadFile
CreateFileA
CloseHandle
Sleep
VirtualProtect
user32
EnumWindows
IsWindowVisible
GetWindowTextA
GetSystemMetrics
GetDesktopWindow
ShowWindow
SetWindowPos
GetWindowDC
GetWindowRect
wsprintfA
gdi32
CreateCompatibleDC
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
DeleteObject
BitBlt
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyA
ws2_32
WSAStartup
ioctlsocket
closesocket
socket
htons
connect
select
__WSAFDIsSet
recv
WSAGetLastError
send
inet_addr
gdiplus
GdiplusStartup
GdipCreateBitmapFromScan0
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipScaleWorldTransform
GdipDrawImageI
GdipSaveImageToFile
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageEncoders
GdipGetImageEncodersSize
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ