Static task
static1
Behavioral task
behavioral1
Sample
ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc.dll
Resource
win10v2004-20240709-en
General
-
Target
ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc
-
Size
45KB
-
MD5
bcb28cf442ea969a5e78ed7bb83f7c11
-
SHA1
245733ee3b9a27cb59f57d1818c75450837ad7d9
-
SHA256
ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc
-
SHA512
92581edd146fdceb6c2b37db9357a24320b38ebd634a9785adb569352f475119e162ab4121d001dccc9b53a1772febcbed778e3416975ecca890729a1246dba2
-
SSDEEP
768:pR9xgQNRJyzerGNHbqekufo4vEqqRYd/8bRtYK7Bk/j7NwGGnQoew8d4G:pRPp6Rho4vvNwpKvNAQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc
Files
-
ef1fc6a2443e2939da8106df0b6313bf3bdcf0a751e102e91e29999568287efc.dll windows:6 windows x64 arch:x64
cb5555b08e190c6c48f0d70fff427cdb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ntdll
RtlRandom
memset
msi
ord123
ord20
ord8
ord158
ord118
ord160
ord159
ord17
ord32
ord92
kernel32
GetFileSize
MultiByteToWideChar
HeapFree
HeapAlloc
ResetEvent
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
VirtualAlloc
VirtualFree
LocalFree
GetModuleFileNameW
GetVersion
GetComputerNameW
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
HeapCreate
CreateEventW
CreateThread
SetEvent
WaitForSingleObject
CloseHandle
CreateFileW
GetLastError
FindFirstFileW
FindNextFileW
FindClose
SetLastError
ReadFile
WriteFile
SetEndOfFile
DeleteFileW
GetTempPathW
GetTempFileNameW
GetLogicalDriveStringsW
GetDriveTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
LeaveCriticalSection
GetCurrentProcessId
CreateMutexW
WaitForMultipleObjects
OpenProcess
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ