Main_SerDialogBox
Static task
static1
Behavioral task
behavioral1
Sample
ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a.dll
Resource
win10v2004-20240611-en
General
-
Target
ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a
-
Size
736KB
-
MD5
0d7e6bfe1951c678654d41bd0ef06315
-
SHA1
761d6e9b8ac95c49c168a795685d922acee6cf80
-
SHA256
ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a
-
SHA512
a40b61408c7ceff63647a77d188e43f43c033b98b56c5c8e376b4d3c288014c83f93a3543e320a9a40ea1ab95a075b1eef01f55170c2d81425959335af1421df
-
SSDEEP
12288:BQ0wO1nQU1vYOeCQFeDfryaJW2nculAYblHn:B/wO1GOUFeDjF82ncQz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a
Files
-
ad6642d9a42777ba10d8251f2f46f900489b3115053e8285504c37962ba1b77a.dll windows:4 windows x86 arch:x86
8f8c7283933131c26cfb5ecfb4741914
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualFree
VirtualAlloc
ReadFile
CloseHandle
GetFileSize
SetFilePointer
CreateFileA
WriteFile
GetModuleFileNameA
WaitForSingleObject
GetCurrentProcess
SetFilePointerEx
CreateThread
SetEvent
CreateEventA
GetLocalTime
FreeLibrary
InterlockedExchangeAdd
GetSystemInfo
InterlockedExchange
DeleteFileA
SetEnvironmentVariableA
CompareStringW
VirtualProtect
LCMapStringW
LCMapStringA
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetProcAddress
lstrcatA
HeapFree
GetModuleHandleA
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapAlloc
CompareStringA
GetCurrentThreadId
TerminateProcess
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
RtlUnwind
ExitProcess
HeapReAlloc
HeapCreate
HeapDestroy
GetTimeZoneInformation
GetSystemTime
GetCommandLineA
GetVersion
GetEnvironmentVariableA
GetVersionExA
user32
CheckMenuItem
GetMenuState
GetMenu
UnregisterClassA
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassA
PostMessageA
wsprintfA
SendMessageA
IsDlgButtonChecked
CheckDlgButton
GetParent
LoadCursorA
SetCursor
CallWindowProcA
SetWindowLongA
DialogBoxParamA
KillTimer
SetWindowTextA
SetTimer
LoadImageA
GetDlgItem
EnableWindow
SetDlgItemTextA
EndDialog
MessageBoxA
GetDlgItemTextA
PostQuitMessage
DefWindowProcA
EnableMenuItem
gdi32
CreateFontIndirectA
CreatePatternBrush
CreateSolidBrush
SetTextColor
GetStockObject
SetBkMode
wsock32
ntohl
gethostbyname
ioctlsocket
wininet
InternetReadFile
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetCloseHandle
InternetSetOptionA
InternetOpenA
HttpQueryInfoA
HttpSendRequestA
Exports
Exports
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 456KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ