Static task
static1
Behavioral task
behavioral1
Sample
334892374872893479845.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
334892374872893479845.dll
Resource
win10v2004-20240709-en
General
-
Target
334892374872893479845.dll
-
Size
235KB
-
MD5
3b11434bcb0404740476550131859ae1
-
SHA1
81aa6309867a37f6c56cd9575e0743ea2e3d427e
-
SHA256
8ad8c1603d764c0f68591bde8a0e16652cd7a6919a76f261725598eda5eae31e
-
SHA512
056b558a6d2c89dfbc612b70f8dcdc99c31df4149d7aa08999a785f7cf81a966a0fc12d77a25fa637f8bf0c987f6ca43035ff3f690bfaaf45a24094595e4bb34
-
SSDEEP
6144:o4qJiSqyiUdtu7v+MW4M+2i3RUfMxgO1F5fA5U7FnQEXf1:xXyiUdUD+Md32ihuMxga5fA5KFQO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 334892374872893479845.dll
Files
-
334892374872893479845.dll.dll windows:6 windows x64 arch:x64
8791d0565af861bef08a80670f2bcc74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
GetModuleFileNameW
OpenProcess
GetTickCount64
GetNativeSystemInfo
WTSGetActiveConsoleSessionId
GetComputerNameW
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTime
ReadFile
WriteFile
ExpandEnvironmentStringsW
GetFileSize
CreateMutexA
TerminateProcess
Sleep
GetModuleHandleW
CreateDirectoryW
FindFirstFileW
VirtualProtect
VirtualFree
FindNextFileW
VirtualAlloc
RemoveDirectoryW
SetFilePointer
FindClose
CreateFileW
GetFileAttributesW
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualQuery
GetLocalTime
WaitForMultipleObjects
CreateEventW
CreateSemaphoreW
DeleteCriticalSection
CloseHandle
GetLastError
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
ReleaseSemaphore
EnterCriticalSection
WideCharToMultiByte
GetProcessHeap
HeapAlloc
HeapFree
GetOEMCP
SetEvent
GetProcAddress
DeleteFileW
advapi32
RegOpenKeyExA
CryptGenRandom
LogonUserW
DuplicateToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
RegQueryValueExA
OpenProcessToken
GetUserNameW
GetTokenInformation
CryptAcquireContextW
CryptReleaseContext
ntdll
NtMapViewOfSection
RtlGetVersion
RtlAdjustPrivilege
NtClose
NtCreateSection
NtUnmapViewOfSection
shlwapi
PathRemoveFileSpecW
ws2_32
htonl
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
winhttp
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpSendRequest
WinHttpConnect
WinHttpSetCredentials
WinHttpCloseHandle
msvcrt
_wcsicmp
memcmp
memcpy
wcscpy_s
strcpy_s
swprintf_s
wcscat_s
_time64
memset
rpcrt4
UuidCreate
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.lrsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE