Static task
static1
Behavioral task
behavioral1
Sample
db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9.dll
Resource
win10v2004-20240611-en
General
-
Target
db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9
-
Size
6.5MB
-
MD5
681a44d22f242db1ad159251af4458d1
-
SHA1
ed3957f6bf78b56e21b69554c681b5e40a90bad5
-
SHA256
db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9
-
SHA512
86365d22cd7a9d6d60282e4ba0321f484ee78950d52ad88da42ecb1f0a10181b79f54e63c00a29b8c56075e524b57a88db0048807a45c29afbe51f3385949f26
-
SSDEEP
196608:FqWxfTTM618Q9C8QvB9DnRsM4EFLWcNWtWOpW:F9xf3MQkzpFLW9tWO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9
Files
-
db72a9466c23f0cfb2aa92d10a9bada614832571ce785ec136a072ed9802e1f9.dll windows:6 windows x86 arch:x86
3a458dfaaff7b2e4ad0ec7da4485e7f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFileType
GetStdHandle
GetACP
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleFileNameA
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteFile
GetModuleFileNameW
CloseHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
OutputDebugStringW
SetStdHandle
WriteConsoleW
ReadConsoleW
CreateFileW
GetThreadTimes
FindNextFileA
GetOEMCP
CreateFileMappingA
LoadLibraryA
ResetEvent
CreateNamedPipeA
CompareStringW
GetEnvironmentVariableW
MulDiv
OpenProcess
GetWindowsDirectoryA
GetTickCount
WaitForSingleObjectEx
GlobalLock
SetDllDirectoryW
LoadLibraryExW
GetSystemTime
IsValidCodePage
FindFirstFileA
LeaveCriticalSection
GetLocaleInfoW
GetProcessTimes
SetCommTimeouts
GetSystemTimeAsFileTime
ExpandEnvironmentStringsA
FreeLibrary
UnmapViewOfFile
GetModuleHandleExW
IsProcessorFeaturePresent
WideCharToMultiByte
EnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
HeapFree
GetCommandLineA
GetCurrentThreadId
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
user32
IsRectEmpty
EndPaint
DestroyWindow
SetCursor
DestroyAcceleratorTable
TrackPopupMenu
IsIconic
SetCapture
SetScrollRange
GetCapture
GetKeyboardState
SetRect
RemoveMenu
SystemParametersInfoA
EnableWindow
EndMenu
LoadCursorA
DialogBoxParamA
CheckMenuItem
RegisterClassA
DrawIconEx
GetClientRect
SetFocus
DrawEdge
BeginPaint
EnumWindows
WaitMessage
GetDC
SetPropA
GetDesktopWindow
GetSysColor
FlashWindow
GetSystemMetrics
DrawFrameControl
GetWindowThreadProcessId
gdi32
GetBitmapBits
TranslateCharsetInfo
GetWindowOrgEx
LineTo
SetBkColor
GetEnhMetaFileHeader
SetPixel
SelectClipRgn
CreateCompatibleDC
CreateRectRgnIndirect
SaveDC
SetPolyFillMode
GetBkColor
SelectPalette
GetTextExtentExPointA
GetTextExtentPointA
GetClipBox
GetPixel
EndDoc
CloseEnhMetaFile
RestoreDC
MoveToEx
GetTextExtentPoint32A
GetMetaFileBitsEx
StretchBlt
GetDIBits
GetRgnBox
CreatePalette
GetRegionData
CreatePenIndirect
CombineRgn
SetMapMode
Ellipse
RealizePalette
GetTextExtentPointW
GetDIBColorTable
SetStretchBltMode
CreateRectRgn
SetROP2
CreateSolidBrush
GetObjectType
advapi32
RegOpenKeyExW
AllocateAndInitializeSid
RegDeleteValueA
RegQueryValueExW
GetUserNameA
RegOpenKeyExA
ole32
CoTaskMemFree
Sections
.text Size: 579KB - Virtual size: 579KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 37.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ