Static task
static1
Behavioral task
behavioral1
Sample
124fc647ca97db789d4543ab5adb2c248506da9b4162ad9148d5f593d1677dbc.dll
Resource
win7-20240705-en
General
-
Target
124fc647ca97db789d4543ab5adb2c248506da9b4162ad9148d5f593d1677dbc
-
Size
6.5MB
-
MD5
118c5877f9dec3937e88319686ce6dc9
-
SHA1
b85583a6ad7b071f8cb8d277ad0f614393d2722e
-
SHA256
124fc647ca97db789d4543ab5adb2c248506da9b4162ad9148d5f593d1677dbc
-
SHA512
36d456300f758767e94f61b3aae53165b60b6a0fcc59514c19fb53124225c795d5ff60a6e9405cea91f83ba950a1f75a572da6085db7f7c0876c3c9f83939eab
-
SSDEEP
196608:DUNed9fL3Jl40mx6ZIGrSGiinSJvdfmO8UwabngIYc:A6hDJ5G6ZIkVcd+OthO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 124fc647ca97db789d4543ab5adb2c248506da9b4162ad9148d5f593d1677dbc
Files
-
124fc647ca97db789d4543ab5adb2c248506da9b4162ad9148d5f593d1677dbc.dll windows:6 windows x86 arch:x86
edb8f99bf1d5620dfad2fc9b011592da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenFileMappingA
GetTempFileNameW
GlobalMemoryStatus
RtlCaptureContext
FindResourceW
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
VerSetConditionMask
WaitNamedPipeA
InitializeSListHead
GetPrivateProfileStringW
SizeofResource
Beep
GetModuleFileNameW
ExitThread
GetTempPathW
RaiseException
GetPrivateProfileIntW
VerifyVersionInfoW
LockResource
GetOEMCP
GetThreadPriority
EnumSystemLocalesW
DeleteFileA
CreateFileW
ReadConsoleW
GetVersion
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
WriteFile
GetFileType
GetStdHandle
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
GetUserDefaultUILanguage
GetStringTypeW
DeviceIoControl
ResetEvent
GlobalFree
GetLastError
FindFirstFileA
WritePrivateProfileStringW
MulDiv
IsProcessorFeaturePresent
GetFileAttributesA
CreateFileA
WideCharToMultiByte
GetSystemDirectoryW
VirtualQueryEx
GetWindowsDirectoryA
GetSystemTimeAsFileTime
VirtualFree
WaitForSingleObject
SetHandleInformation
CreateDirectoryW
SetEnvironmentVariableW
LoadResource
SetErrorMode
WriteConsoleW
GetModuleHandleExW
ExitProcess
GetUserDefaultLCID
IsValidLocale
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
HeapReAlloc
HeapFree
RtlUnwind
HeapAlloc
GetCommandLineA
GetCurrentThreadId
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
user32
ClientToScreen
GetDlgItemInt
RegisterWindowMessageW
GetSubMenu
ModifyMenuW
CreateDialogIndirectParamA
SystemParametersInfoW
DrawStateW
CharUpperW
DrawTextExW
SendDlgItemMessageW
EnableScrollBar
SetDlgItemTextW
SetWindowTextW
DestroyIcon
DrawFrameControl
SetMenuItemInfoW
PostMessageW
AttachThreadInput
GetMenuItemInfoW
GetDC
GetWindowLongW
GetDesktopWindow
MessageBoxW
GetMonitorInfoW
CopyRect
DestroyCursor
gdi32
CreateFontIndirectW
GetRgnBox
CombineRgn
GetTextExtentPointW
CreateBitmapIndirect
SetROP2
CreateEnhMetaFileW
CreatePolygonRgn
ExtFloodFill
GetRegionData
RectInRegion
GetMetaFileBitsEx
advapi32
RegUnLoadKeyW
AdjustTokenPrivileges
RegEnumKeyExW
ControlService
RegSetKeySecurity
RegConnectRegistryW
QueryServiceStatus
RegGetKeySecurity
LookupPrivilegeValueW
RegDeleteKeyA
RegQueryValueExW
shell32
Shell_NotifyIconW
oleaut32
SysFreeString
VariantInit
Sections
.text Size: 546KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ