Static task
static1
Behavioral task
behavioral1
Sample
67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53.dll
Resource
win10v2004-20240709-en
General
-
Target
67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53.exe
-
Size
138KB
-
MD5
39e999d2eae96a96fc5981f08035feba
-
SHA1
4fbc5658c382a8538c64b5f55684cce8b6f0d5a6
-
SHA256
67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53
-
SHA512
2f000817aa4ab985aadff7a3bd2907e8e9ab06b60542eb48d63a2fe519d2a679c84102b28ae2cacf947e063d7cfb1ca0ac747403c573763958ce8120acf3fafe
-
SSDEEP
3072:GtvOkFJBo0vYmBgkCxEbX5NrCkhlDckFMZ5G:GZOEo0v1BgkKMjrhe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53.exe
Files
-
67d38f39272b46209995e6e0eddfdb6e3165505016fdf1d40ddc37d2f07b3b53.exe.dll windows:6 windows x64 arch:x64
652d338ee1a36178130b076b649e3f12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetComputerNameA
VirtualFree
LoadLibraryExA
GetProcAddress
VirtualProtect
WriteConsoleW
LoadLibraryA
GetSystemDefaultLangID
GetCurrentProcess
CloseHandle
GetLastError
Sleep
CreateFileW
FreeLibrary
GetModuleFileNameW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
SetFilePointerEx
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
TerminateProcess
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
GetStdHandle
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
FindClose
FindFirstFileExW
advapi32
GetUserNameA
CryptDestroyKey
CryptAcquireContextW
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptReleaseContext
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
wininet
HttpSendRequestW
InternetConnectA
HttpOpenRequestA
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ