StartW
Static task
static1
Behavioral task
behavioral1
Sample
68ed32d4c85b26981497819e2a02b000N.dll
Resource
win7-20240704-en
General
-
Target
68ed32d4c85b26981497819e2a02b000N
-
Size
538KB
-
MD5
68ed32d4c85b26981497819e2a02b000
-
SHA1
7e3437ccb22a602ab373beafe63b4191324c2cc5
-
SHA256
7ad821e7fd74e852a26bfce6a57dd28dfdcb3199de132f915e27dab20554b722
-
SHA512
be771e9db682ac939e7ca360e6f36050570b2bc7e23628da6145abd5d647f77515640691c7ca67b338482bae942997759086350ab0b1e6f1f28992926b09e189
-
SSDEEP
6144:gb7y19WiGXncPH94/0EVruP8e7BIi3rdgEfrJgqZDB+8EGerYpt8ftwaMU3B6lex:AncPH2/0EVA7BvaVNG5z81S86lZ/i3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68ed32d4c85b26981497819e2a02b000N
Files
-
68ed32d4c85b26981497819e2a02b000N.dll windows:5 windows x86 arch:x86
afa2ec665dcca67fcd2e07f1a276b8c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mswsock
TransmitFile
kernel32
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
RtlUnwind
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapFree
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
VirtualFree
HeapDestroy
GetStdHandle
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
FileTimeToSystemTime
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
GetCurrentProcessId
CreateEventA
SetEvent
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
WaitForSingleObject
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
lstrlenA
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
LoadLibraryA
SetLastError
MultiByteToWideChar
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
lstrcpyA
GetModuleFileNameA
GetQueuedCompletionStatus
GetLastError
FormatMessageA
LocalFree
Sleep
CloseHandle
GetCurrentThreadId
GetCurrentThread
SuspendThread
CancelIo
PostQueuedCompletionStatus
GetExitCodeThread
ResumeThread
CreateIoCompletionPort
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryW
GetCurrentProcess
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
HeapCreate
user32
IsWindowEnabled
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
EnableWindow
SendMessageA
DrawIcon
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
GetSystemMetrics
LoadIconA
KillTimer
SetTimer
InvalidateRect
GetClientRect
IsIconic
DestroyMenu
LoadCursorA
GetSysColorBrush
CharUpperA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
PostQuitMessage
ShowWindow
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
SetMapMode
DeleteDC
GetStockObject
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
ws2_32
WSASocketA
WSACreateEvent
WSAEventSelect
bind
listen
WSAEnumNetworkEvents
WSAAccept
WSACleanup
htons
WSACloseEvent
WSASend
WSARecv
WSAWaitForMultipleEvents
closesocket
setsockopt
getpeername
inet_ntoa
WSAStartup
WSAGetLastError
socket
gethostbyname
oleacc
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ