Static task
static1
Behavioral task
behavioral1
Sample
f6b8bc57c5df7b340e44c261806baf2092af81b03eeca889808fac99fee66c13.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f6b8bc57c5df7b340e44c261806baf2092af81b03eeca889808fac99fee66c13.dll
Resource
win10v2004-20240226-en
General
-
Target
c4d312a8d58b223e5d9ba3394b596ed1.bin
-
Size
248KB
-
MD5
f8cde1487436af9d331a1c931c22f6f4
-
SHA1
594ad605faaaa7bb8d21e77a95096a6cc2c743cb
-
SHA256
4e3efcbedf290d39d893af33d2a1346cf7148c9a1de1a852f728ae1a0129a3bb
-
SHA512
62bd307b3c6d2a4deffcab116616b77b45065550c6f2aca262c56b656bd095b01c53acfec97105efed8092a053786379af88714f9a8dce1ab09240c5bb617ff0
-
SSDEEP
6144:GKiKu2xk5Fs/QUOiaXCC0Hy+qVhE7+QobjfsJi7KOSPzA:GKQ/jsG5f0aVGyQCjfC8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f6b8bc57c5df7b340e44c261806baf2092af81b03eeca889808fac99fee66c13.exe
Files
-
c4d312a8d58b223e5d9ba3394b596ed1.bin.zip
Password: infected
-
f6b8bc57c5df7b340e44c261806baf2092af81b03eeca889808fac99fee66c13.exe.dll windows:6 windows x64 arch:x64
Password: infected
5f2a9da52448c24834df0bfa9ed91cfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
SetEvent
OpenEventW
OpenFileMappingW
GetLocalTime
WaitForSingleObject
GetTickCount64
Sleep
WritePrivateProfileStringA
FreeLibraryAndExitThread
CreateFileMappingA
OutputDebugStringA
GetPrivateProfileStringA
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
TerminateThread
SuspendThread
ResumeThread
IsBadReadPtr
MapViewOfFile
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
ExitThread
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FormatMessageA
FreeLibrary
LoadLibraryExA
GetModuleFileNameA
SetThreadContext
GetThreadContext
GetCurrentProcessId
OutputDebugStringW
GetLastError
CloseHandle
GetCurrentProcess
SetPriorityClass
OpenThread
GetProcAddress
AllocConsole
CreateSemaphoreA
GetModuleHandleA
GetModuleFileNameW
ReleaseSemaphore
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
AddVectoredExceptionHandler
RtlAddFunctionTable
user32
IsWindowVisible
GetWindowTextA
GetWindowThreadProcessId
FindWindowExA
SetForegroundWindow
MessageBoxA
PostMessageW
SetTimer
SwitchToThisWindow
AttachThreadInput
SendMessageW
BringWindowToTop
GetForegroundWindow
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Random_device@std@@YAIXZ
shlwapi
PathStripPathW
StrCatW
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcmp
memchr
__std_exception_destroy
strstr
memset
__C_specific_handler
memcpy
_CxxThrowException
memmove
strchr
__std_type_info_destroy_list
__current_exception_context
__current_exception
strrchr
__intrinsic_setjmp
longjmp
__std_exception_copy
api-ms-win-crt-runtime-l1-1-0
strerror
abort
exit
_errno
system
_invalid_parameter_noinfo_noreturn
_initterm_e
_initterm
terminate
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
api-ms-win-crt-stdio-l1-1-0
_fseeki64
fgets
__stdio_common_vsprintf
__stdio_common_vswprintf
fclose
__stdio_common_vfprintf
_ftelli64
fopen
freopen_s
ungetc
__stdio_common_vsprintf_s
clearerr
freopen
ferror
tmpnam
_popen
fread
fwrite
__acrt_iob_func
fflush
getc
_pclose
feof
setvbuf
__stdio_common_vswprintf_s
tmpfile
api-ms-win-crt-heap-l1-1-0
free
malloc
_callnewh
realloc
api-ms-win-crt-string-l1-1-0
strpbrk
islower
toupper
strncmp
isalnum
isdigit
isgraph
isupper
strcpy
tolower
isalpha
isxdigit
strlen
strcat
strcat_s
wcslen
wcscpy
iscntrl
strcmp
isspace
_stricmp
strcoll
strspn
_wcsicmp
ispunct
wcsncpy_s
api-ms-win-crt-convert-l1-1-0
strtod
_i64toa
strtoul
_itoa
_atoi64
atof
atoi
api-ms-win-crt-utility-l1-1-0
srand
rand
api-ms-win-crt-time-l1-1-0
_time64
_gmtime64
_difftime64
_mktime64
strftime
clock
_localtime64
api-ms-win-crt-filesystem-l1-1-0
_access
remove
rename
_mkdir
api-ms-win-crt-math-l1-1-0
ceil
ldexp
log10
pow
sin
log
sqrt
atan2
frexp
asin
acos
exp
fmod
sqrtf
floor
cos
tan
api-ms-win-crt-locale-l1-1-0
setlocale
localeconv
api-ms-win-crt-environment-l1-1-0
getenv
Sections
.text Size: 478KB - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ