Static task
static1
Behavioral task
behavioral1
Sample
c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92.dll
Resource
win10v2004-20240611-en
General
-
Target
c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92
-
Size
6.5MB
-
MD5
8cc6b699545ed0e9c006d88645a4d5f4
-
SHA1
ec846c1b9d76cd26666efe9bb6014c08f7c09cee
-
SHA256
c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92
-
SHA512
6b34350acb34e3949b209490339dfd982fa11bc4124c1fb8860f582c9541311e42edcc371e50aaf9ef7fa9d33d8881118834c1556b382559f20e84729179491c
-
SSDEEP
196608:EYK8jPXnXhcf5PrChU01KOVf3lskmjuveRf:ZjP3X2Pry1KQ11mi4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92
Files
-
c628f3ac02c9547cd87dc47589a1845eb2069bd9535b4ec69f8bdd6a7c4afa92.dll windows:6 windows x86 arch:x86
caf89f5c7e3f84734e0e5e9ea6bde3eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FlushFileBuffers
CloseHandle
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsDebuggerPresent
GetProcessHeap
HeapSize
AreFileApisANSI
GetModuleHandleExW
WriteFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
GetConsoleMode
ReadFile
SetFilePointerEx
GetModuleFileNameA
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
LoadLibraryExW
SetStdHandle
WriteConsoleW
ReadConsoleW
OutputDebugStringW
OpenFileMappingA
GetThreadTimes
DeleteCriticalSection
IsValidCodePage
SetLastError
GetTimeZoneInformation
CreateFileW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
SetCommTimeouts
GetCommandLineA
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
WaitForSingleObjectEx
ConnectNamedPipe
SetHandleInformation
QueryPerformanceCounter
SetEnvironmentVariableW
SetEndOfFile
VirtualQuery
GetDateFormatW
CreateFileMappingA
FindFirstFileA
ExitProcess
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
HeapFree
GetCurrentThreadId
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
user32
DestroyWindow
SetTimer
PostQuitMessage
KillTimer
MsgWaitForMultipleObjects
IsZoomed
RemovePropA
GetWindowInfo
ShowCaret
BeginPaint
EnumWindows
SetScrollRange
GetDoubleClickTime
GetWindowPlacement
SetWindowLongA
GetScrollInfo
SetClassLongA
SetWindowsHookExA
RedrawWindow
SetMenu
CreatePopupMenu
CheckRadioButton
ToUnicode
SetScrollInfo
GetWindowThreadProcessId
EndPaint
GetMessageA
SetWindowRgn
IsIconic
CreateMenu
GetWindowTextLengthA
GetDC
GetKeyboardState
GetDesktopWindow
MessageBoxW
ScrollWindowEx
DestroyIcon
CheckMenuItem
gdi32
CreatePolygonRgn
TranslateCharsetInfo
SetViewportOrgEx
GetDeviceCaps
CreateFontIndirectA
CopyEnhMetaFileA
GetRgnBox
GetEnhMetaFileHeader
CreateBitmap
CreateRectRgnIndirect
RectInRegion
SaveDC
GetObjectType
CreateBitmapIndirect
GetCharABCWidthsW
CreatePatternBrush
SetViewportExtEx
SetWinMetaFileBits
CreateEnhMetaFileW
UpdateColors
MoveToEx
SetWindowOrgEx
StretchBlt
GdiFlush
Rectangle
GetTextExtentPointW
GetTextExtentPointA
GetCharABCWidthsFloatA
SetROP2
RectVisible
IntersectClipRect
CreateCompatibleDC
advapi32
GetLengthSid
RegOpenKeyExW
AllocateAndInitializeSid
RegCloseKey
RegDeleteKeyA
EqualSid
Sections
.text Size: 540KB - Virtual size: 539KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ