Static task
static1
Behavioral task
behavioral1
Sample
2a420bc1d530f0f1ef2be34870157d90N.dll
Resource
win7-20240704-en
General
-
Target
2a420bc1d530f0f1ef2be34870157d90N.exe
-
Size
6.0MB
-
MD5
2a420bc1d530f0f1ef2be34870157d90
-
SHA1
408bd4f5bb44cfbe541b4078c2fd72984cfde761
-
SHA256
9f3e7807023d7f76f4dbd266edada84159edb5b1b6c340d25620bf21ab6a150b
-
SHA512
b04f736c59a3d7519daf0378f1f3225fa3eba26d6a441e177546b4a4d8da2c5abac207dc557f884ffdb92c17298f551abb07f6d2148007fa54ebe3c84bc23a61
-
SSDEEP
49152:XwyhzTCuOKh8bR3rlqKyeIWe5ux8Pk1/1peB1O5a7pdO9PamYzpn3dkYqbiKoDJR:TCuO8gR0Vp75I88pVPWOoDJDV/f24
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a420bc1d530f0f1ef2be34870157d90N.exe
Files
-
2a420bc1d530f0f1ef2be34870157d90N.exe.dll windows:6 windows x86 arch:x86
eebe661a63b13ec0bd243cd160988440
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
PathRemoveFileSpecA
PathIsDirectoryW
PathAppendA
crypt32
CertOpenStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertCloseStore
ws2_32
ioctlsocket
getsockopt
ntohs
socket
setsockopt
connect
closesocket
shutdown
send
recv
WSASetLastError
getservbyname
getservbyport
gethostbyaddr
inet_ntoa
inet_addr
htons
htonl
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
select
kernel32
GetDriveTypeW
SetConsoleCtrlHandler
WriteConsoleW
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetModuleFileNameA
GetModuleFileNameW
InitializeCriticalSection
SetErrorMode
WaitForSingleObject
GetModuleHandleA
CloseHandle
CreateThread
AddVectoredExceptionHandler
GetProcAddress
GetCurrentProcessId
WideCharToMultiByte
CreateEventA
SetUnhandledExceptionFilter
lstrlenW
GetCurrentThreadId
ReleaseMutex
ResumeThread
IsBadReadPtr
lstrcmpW
GetModuleHandleW
InitOnceExecuteOnce
SetLastError
EncodePointer
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
DecodePointer
AcquireSRWLockShared
ReadFile
GetFileSizeEx
GetCurrentProcess
WriteFile
SetFilePointer
QueryDosDeviceA
GetCommandLineA
K32GetModuleFileNameExA
GetLastError
CreateFileA
GetVersionExA
GetSystemInfo
GetLogicalDriveStringsA
CreateDirectoryA
GetSystemTime
DuplicateHandle
GetCurrentThread
GetThreadContext
GetThreadId
SetThreadContext
OpenThread
K32GetProcessImageFileNameA
OutputDebugStringA
FormatMessageA
UnmapViewOfFile
LoadLibraryA
QueryDosDeviceW
MoveFileA
GetFullPathNameA
SetEndOfFile
DeleteFileA
CreateFileMappingA
MapViewOfFile
WriteProcessMemory
K32GetMappedFileNameA
CreateToolhelp32Snapshot
K32EnumProcessModules
K32GetMappedFileNameW
InitializeCriticalSectionEx
MultiByteToWideChar
RaiseException
DeleteCriticalSection
K32GetModuleInformation
IsWow64Process
FindFirstFileA
FindNextFileA
PeekNamedPipe
TlsSetValue
TlsAlloc
TlsGetValue
VirtualAlloc
GetCommandLineW
CreateMutexW
SetEvent
GetLongPathNameW
EnterCriticalSection
LeaveCriticalSection
CreateFileW
ExitProcess
GetSystemTimeAsFileTime
GetTickCount
VirtualProtect
GetFullPathNameW
HeapQueryInformation
Thread32Next
Thread32First
GetWindowsDirectoryA
GetLocalTime
LocalFree
SetNamedPipeHandleState
GetStdHandle
Sleep
TransactNamedPipe
FileTimeToSystemTime
SystemTimeToFileTime
GetFileSize
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
CreateMutexA
TlsFree
OpenProcess
VirtualQueryEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleExW
SwitchToThread
InitializeSRWLock
GetSystemDirectoryA
FreeLibrary
VirtualFree
GetFileType
GetEnvironmentVariableW
GetACP
LoadLibraryW
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InterlockedFlushSList
RtlUnwind
OutputDebugStringW
GetStringTypeW
GetCPInfo
HeapSize
SetFilePointerEx
GetTimeZoneInformation
SetStdHandle
GetConsoleOutputCP
FlushFileBuffers
GetCurrentDirectoryW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
HeapValidate
CompareStringW
FindClose
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
ReadProcessMemory
GetProcessId
VirtualQuery
GetProcessHeap
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
user32
wsprintfW
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
advapi32
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ConvertSidToStringSidW
GetTokenInformation
CryptCreateHash
CryptDestroyHash
CryptReleaseContext
RegSetKeyValueW
ole32
CoCreateFreeThreadedMarshaler
StringFromGUID2
bcrypt
BCryptGenRandom
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 1024B - Virtual size: 751B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ