Static task
static1
Behavioral task
behavioral1
Sample
4c26f4822a10a54be289fb50ca61bd30N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c26f4822a10a54be289fb50ca61bd30N.dll
Resource
win10v2004-20240709-en
General
-
Target
4c26f4822a10a54be289fb50ca61bd30N.exe
-
Size
517KB
-
MD5
4c26f4822a10a54be289fb50ca61bd30
-
SHA1
0824c3f6412a8d64f0acfdc1563fec8c7cefd057
-
SHA256
df522e1846a4a1befb0f41e3975ef065031e36a1e2e16b8ad31cb682c2ee2b51
-
SHA512
4ca3109d4a347411ed9085e430f732d553392ca367467f9a55fdb8f81de7a35dc30c1482a08d1741e9fbefe6b879f8b17540062a68366ddc4ec7b87232414ee2
-
SSDEEP
12288:AQ+Si5ljEETVuA65qfV4hf1KM+NOo2E54PmHi/:qSi5CETYj5q9YwM+oorPHi/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c26f4822a10a54be289fb50ca61bd30N.exe
Files
-
4c26f4822a10a54be289fb50ca61bd30N.exe.dll windows:6 windows x86 arch:x86
60fdaaeeadf137a4949f014ba4f7810c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetModuleFileNameA
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
WriteFile
GetStdHandle
HeapSize
GetProcessHeap
IsDebuggerPresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CloseHandle
GetModuleHandleW
GetStartupInfoW
TlsGetValue
TlsAlloc
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
HeapAlloc
GetCPInfo
RtlUnwind
RaiseException
FlushFileBuffers
GetConsoleMode
ReadFile
SetFilePointerEx
HeapReAlloc
OutputDebugStringW
SetStdHandle
WriteConsoleW
ReadConsoleW
GetTickCount
WaitNamedPipeA
GetSystemTime
GetFileType
EnterCriticalSection
CreateNamedPipeA
LeaveCriticalSection
GetConsoleCP
TlsSetValue
GetSystemDefaultLangID
QueryPerformanceCounter
DeleteCriticalSection
CreateEventW
GetModuleFileNameW
SetHandleInformation
FreeLibrary
UnmapViewOfFile
GlobalMemoryStatus
LoadLibraryA
GlobalFree
CreateFileW
TerminateProcess
GetEnvironmentStringsW
TlsFree
LocalFree
CreatePipe
MultiByteToWideChar
WideCharToMultiByte
EncodePointer
DecodePointer
GetStringTypeW
GetLastError
HeapFree
ExitProcess
GetModuleHandleExW
GetProcAddress
GetCommandLineA
GetCurrentThreadId
user32
RegisterClassA
ToAsciiEx
DestroyWindow
EndDialog
GetSysColor
CheckDlgButton
SystemParametersInfoA
EnableWindow
SetDlgItemTextA
CheckMenuItem
GetMessageTime
GetSystemMenu
UnregisterClassA
CreateDialogParamA
DrawIconEx
GetParent
SetParent
WaitMessage
GetKeyboardState
GetKeyboardLayout
CheckMenuRadioItem
SetScrollPos
AppendMenuA
MessageBoxW
EndMenu
LoadCursorA
DefWindowProcA
DestroyCursor
RegisterClassW
IsIconic
KillTimer
RemovePropA
DrawFocusRect
GetWindowPlacement
EnableMenuItem
ScrollWindow
DialogBoxParamA
ToUnicode
MessageBoxA
HideCaret
GetDC
GetDesktopWindow
PostMessageA
GetSystemMetrics
GetWindowThreadProcessId
gdi32
CreatePalette
GetBkColor
BitBlt
SetMapMode
OffsetRgn
ExtCreateRegion
ExtTextOutA
UpdateColors
SetBkColor
GetPixel
CreatePolygonRgn
GetWindowOrgEx
CreateHalftonePalette
GetEnhMetaFileHeader
CreateBitmap
SelectPalette
GetTextExtentExPointA
GetCharABCWidthsW
SetStretchBltMode
CreatePatternBrush
GetClipBox
SetROP2
CreateEnhMetaFileW
MoveToEx
SetTextColor
CreateHatchBrush
CreatePenIndirect
RectInRegion
GetCurrentPositionEx
GetObjectW
Polyline
SetTextAlign
GetStockObject
CreatePen
RoundRect
GetTextExtentPoint32A
advapi32
RegCloseKey
GetUserNameA
RegDeleteKeyA
Sections
.text Size: 389KB - Virtual size: 389KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ