Static task
static1
Behavioral task
behavioral1
Sample
19fb311841740876352f121553a658fab4e026654b33a946cf70a1b093328a60.dll
Resource
win7-20240708-en
General
-
Target
19fb311841740876352f121553a658fab4e026654b33a946cf70a1b093328a60
-
Size
5.2MB
-
MD5
8fcd9a47454dcec48306507aff8ddcbc
-
SHA1
1b6cb07083de093e20c7624bdc6a2b3361044565
-
SHA256
19fb311841740876352f121553a658fab4e026654b33a946cf70a1b093328a60
-
SHA512
44ec356b84544510f954fc1038a355207bcb6f67ecf7419d807a71a203b5f31e9feb501ea6a38a3bc9b760c82890202e23db86a9fe4d19273554dd09766878ba
-
SSDEEP
49152:104mS4pIRjnh+yR5l1mQw9IJtwuhTsfAPLnzZF3dkYUsDJNsc8jDj5ZkaGAC0w2C:1T4pIRbhXvt9hTs49OsDJNsc8+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19fb311841740876352f121553a658fab4e026654b33a946cf70a1b093328a60
Files
-
19fb311841740876352f121553a658fab4e026654b33a946cf70a1b093328a60.dll windows:6 windows x86 arch:x86
c9e7bd70a9b868df24f5135aa881779f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
PathRemoveFileSpecA
PathIsDirectoryW
PathAppendA
crypt32
CertOpenStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertCloseStore
ws2_32
ioctlsocket
getsockopt
ntohs
socket
setsockopt
connect
closesocket
shutdown
send
recv
WSASetLastError
getservbyname
getservbyport
gethostbyaddr
inet_ntoa
inet_addr
htons
htonl
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
select
kernel32
GetDriveTypeW
SetConsoleCtrlHandler
WriteConsoleW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetModuleFileNameW
InitializeCriticalSection
SetErrorMode
WaitForSingleObject
GetModuleHandleA
CloseHandle
CreateThread
AddVectoredExceptionHandler
GetProcAddress
GetCurrentProcessId
WideCharToMultiByte
CreateEventA
SetUnhandledExceptionFilter
lstrlenW
GetCurrentThreadId
ReleaseMutex
ResumeThread
IsBadReadPtr
lstrcmpW
GetModuleHandleW
InitOnceExecuteOnce
SetLastError
EncodePointer
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
DecodePointer
AcquireSRWLockShared
ReadFile
GetFileSizeEx
GetCurrentProcess
WriteFile
SetFilePointer
QueryDosDeviceA
GetCommandLineA
K32GetModuleFileNameExA
GetLastError
CreateFileA
GetVersionExA
GetSystemInfo
GetLogicalDriveStringsA
CreateDirectoryA
GetSystemTime
DuplicateHandle
GetCurrentThread
GetThreadContext
GetThreadId
SetThreadContext
OpenThread
K32GetProcessImageFileNameA
OutputDebugStringA
FormatMessageA
LoadLibraryA
QueryDosDeviceW
MoveFileA
GetFullPathNameA
SetEndOfFile
DeleteFileA
WriteProcessMemory
K32GetMappedFileNameA
CreateToolhelp32Snapshot
K32EnumProcessModules
K32GetMappedFileNameW
InitializeCriticalSectionEx
MultiByteToWideChar
RaiseException
DeleteCriticalSection
K32GetModuleInformation
IsWow64Process
FindFirstFileA
FindNextFileA
PeekNamedPipe
TlsSetValue
TlsAlloc
TlsGetValue
VirtualAlloc
GetCommandLineW
CreateMutexW
SetEvent
GetLongPathNameW
EnterCriticalSection
LeaveCriticalSection
CreateFileW
ExitProcess
GetSystemTimeAsFileTime
GetTickCount
VirtualProtect
VirtualQuery
GetProcessId
Thread32Next
Thread32First
GetWindowsDirectoryA
GetLocalTime
LocalFree
SetNamedPipeHandleState
GetStdHandle
Sleep
TransactNamedPipe
FileTimeToSystemTime
SystemTimeToFileTime
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
TlsFree
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleExW
SwitchToThread
InitializeSRWLock
GetSystemDirectoryA
FreeLibrary
VirtualFree
GetFileType
GetEnvironmentVariableW
GetACP
LoadLibraryW
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InterlockedFlushSList
RtlUnwind
OutputDebugStringW
GetStringTypeW
GetCPInfo
HeapSize
SetFilePointerEx
GetTimeZoneInformation
SetStdHandle
GetConsoleOutputCP
FlushFileBuffers
GetCurrentDirectoryW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
CompareStringW
LCMapStringW
FindClose
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
ReadProcessMemory
GetFullPathNameW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
user32
wsprintfW
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
advapi32
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
OpenProcessToken
ConvertSidToStringSidW
GetTokenInformation
CryptCreateHash
CryptDestroyHash
CryptReleaseContext
RegSetKeyValueW
ole32
CoCreateFreeThreadedMarshaler
StringFromGUID2
bcrypt
BCryptGenRandom
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ