Static task
static1
Behavioral task
behavioral1
Sample
955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68.dll
Resource
win10v2004-20240508-en
General
-
Target
955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68
-
Size
49KB
-
MD5
04e533d60eff65197e2196688274b149
-
SHA1
9d8733f9d5ebb4040b579193873b8918f757354d
-
SHA256
955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68
-
SHA512
465a0aa697f543d190156e56eb9abc9b25fd916f32384d428168fda512cdd6759590a11d217b28a9616bcf313c06a8cc0ca5c9494423a675ef9f1c9848dd7ec5
-
SSDEEP
768:bU4LxBK2O5kGFT6mHgkLo0C4mL4AJ7EzkB4ze4CXUjt5tabedy:bUFVFlLodUAhOY4rzjt2bed
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68
Files
-
955a261c3027d314548dace4860694e1b85cb15473b3436bb702e530a5b28f68.dll windows:6 windows x64 arch:x64
023faa0a1f3842b18afee054ed8ebb59
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
DeleteCriticalSection
CloseHandle
OpenProcess
GetModuleHandleW
GetProcAddress
LoadLibraryExW
QueryFullProcessImageNameW
IsBadReadPtr
InitializeCriticalSectionEx
VirtualProtect
VirtualQuery
FreeLibrary
ExitProcess
Sleep
EncodePointer
InterlockedFlushSList
RtlUnwindEx
GetLastError
AddVectoredExceptionHandler
InitializeSListHead
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
GetSystemTimeAsFileTime
GetModuleHandleExW
IsDebuggerPresent
OutputDebugStringW
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
QueryPerformanceCounter
user32
GetWindowTextW
FindWindowW
GetWindowThreadProcessId
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
msvcrt
__getmainargs
__CppXcptFilter
strcpy_s
_initterm_e
_initterm
_callnewh
abort
_msize
_errno
malloc
tolower
free
_local_unwind
__DestructExceptionObject
_amsg_exit
memset
memmove
memcpy
__C_specific_handler
_CxxThrowException
?terminate@@YAXXZ
realloc
__CxxFrameHandler3
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ