Static task
static1
Behavioral task
behavioral1
Sample
4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1.dll
Resource
win10v2004-20240802-en
General
-
Target
4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1
-
Size
128KB
-
MD5
264f6519353e1d72c7512e831798c11e
-
SHA1
cdd6b87ed380be3687fbb571edfb62647c14ab7c
-
SHA256
4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1
-
SHA512
fd1e5fb210b9e135e299588ddcf6c5e96778eb313a05add3d77f288e62e906b7be75a956613c055798170d075d06a2d74fd6d892b0335609cd3b08f5bc7679fe
-
SSDEEP
3072:CBN0UTVOsNvFvFyGjx8TyAIXp3kn0Zwkp:a0UTIiFMGjxiyl2kp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1
Files
-
4c3b5b57db543752fe2c4b33a2a567f2ed703f72e3684a7ac4d72941d5a999b1.dll windows:5 windows x86 arch:x86
1a5076a1ebe10c2fd2dce764f733ba64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetEndOfFile
GetLastError
CreateDirectoryA
Sleep
GetCurrentProcess
MoveFileExA
SetEnvironmentVariableA
CompareStringW
CreateFileW
CreateFileA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
WriteConsoleW
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCurrentThreadId
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetProcAddress
GetModuleHandleW
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetFileAttributesA
CloseHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
LoadLibraryW
GetProcessHeap
user32
ExitWindowsEx
advapi32
OpenProcessToken
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
RegSetValueExA
shell32
SHGetFolderPathA
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ