inflate
Static task
static1
Behavioral task
behavioral1
Sample
9851a82839589690f8b51f8187319a80N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9851a82839589690f8b51f8187319a80N.dll
Resource
win10v2004-20240802-en
General
-
Target
9851a82839589690f8b51f8187319a80N.exe
-
Size
184KB
-
MD5
9851a82839589690f8b51f8187319a80
-
SHA1
9a65a7a1bcf6a49faebc606a3a58cc1a2cf1e812
-
SHA256
5a60ebb11e7e73f17ffab1ba0561560fa2437bd71e68dfc5f8951b4b5b77a3bb
-
SHA512
d43b6fa2cffc052577ef893c389988c1be6d94b531c6ee209f75fc724da6aa6d348d73d9b58e6a5af058a734a180a1d50d4b916978af5ce215191fb51cdfe2ca
-
SSDEEP
3072:YXFF+uZRl3zKTG1PZvbnkE8OCtR6kX4nxtR8RtzR6Vj5FwwTlS:Y1FJZDKG1P1zkEDER6kXAtqEVjc4s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9851a82839589690f8b51f8187319a80N.exe
Files
-
9851a82839589690f8b51f8187319a80N.exe.dll windows:0 windows x86 arch:x86
1cb44e3fd2b456c57ddbbc34a99f6c10
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord6059
ord389
ord3229
ord5204
ord5808
ord500
ord772
ord540
ord800
ord5356
ord690
ord1988
ord823
msvcrt
rand
strchr
strncpy
sscanf
__CxxFrameHandler
wcscat
memcpy
malloc
free
_strnicmp
strcpy
srand
memcmp
_stricmp
strrchr
strcat
time
localtime
strftime
vsprintf
sprintf
strlen
memset
atoi
strcspn
strstr
_except_handler3
_CxxThrowException
tolower
toupper
strcmp
wcscpy
strncat
calloc
_mbsstr
_mbsnbcpy
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_memicmp
kernel32
CreateToolhelp32Snapshot
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
FormatMessageA
CreateProcessA
GetLocalTime
VirtualQuery
lstrcatA
DeviceIoControl
SetFileAttributesA
MoveFileA
LocalFree
Process32First
lstrcmpiA
DebugActiveProcess
Process32Next
ExpandEnvironmentStringsA
GetModuleHandleA
InterlockedIncrement
CopyFileA
InterlockedExchange
CreateMutexA
ReleaseMutex
SetLastError
WinExec
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
TerminateThread
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
DuplicateHandle
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
wsprintfA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
RegQueryInfoKeyA
RegEnumValueA
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
ws2_32
inet_addr
htonl
sendto
closesocket
WSACleanup
send
__WSAFDIsSet
recv
connect
setsockopt
WSAIoctl
WSAStartup
socket
htons
ntohs
bind
ioctlsocket
select
recvfrom
WSAGetLastError
shlwapi
PathIsDirectoryA
PathFileExistsA
StrStrIA
ntdll
NtQueryInformationFile
NtQuerySystemInformation
psapi
GetModuleFileNameExA
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoInitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SysAllocStringByteLen
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantInit
SysStringLen
VariantClear
msvcp60
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
netapi32
Netbios
Exports
Exports
Sections
.text Size: - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lak0 Size: - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.lak1 Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ