Static task
static1
Behavioral task
behavioral1
Sample
00db74544ae4d92774a3008a5ee322577dab2a53bcb2eb9003e88af617f3b495.dll
Resource
win7-20240704-en
General
-
Target
00db74544ae4d92774a3008a5ee322577dab2a53bcb2eb9003e88af617f3b495.dll
-
Size
6.4MB
-
MD5
edd94a0a267df670b90f41c127f9dd6a
-
SHA1
bd0005769a9392a922030793b1e88900a808f22a
-
SHA256
00db74544ae4d92774a3008a5ee322577dab2a53bcb2eb9003e88af617f3b495
-
SHA512
f9168a60b0af17f7d53f80e1b906feb59d44a195b067f938b3925716b46a72279c71a40d8188f110e0d40318ba2a41bea78be4b63672a465cab98cf069f8291c
-
SSDEEP
98304:e4p5fRmhQ1orSk3GCK4J7vADNR6oXc0/8+x0bRtI4PPgbYhiLC9kEN6+/mu:eKfiQ15M2aIDS0i+SRi4samC9bN9O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00db74544ae4d92774a3008a5ee322577dab2a53bcb2eb9003e88af617f3b495.dll
Files
-
00db74544ae4d92774a3008a5ee322577dab2a53bcb2eb9003e88af617f3b495.dll.dll windows:6 windows x86 arch:x86
080e9a7727d30a43ca5568c2e04b20cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FillConsoleOutputAttribute
GetConsoleScreenBufferInfo
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
GetModuleFileNameW
SetFilePointerEx
FillConsoleOutputCharacterA
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetFileType
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
SetConsoleTextAttribute
SetConsoleCursorPosition
Sleep
GetStdHandle
CreateThread
LocalFree
CloseHandle
CreateEventW
CreateFileMappingA
FindClose
EnterCriticalSection
IsDBCSLeadByteEx
FindFirstFileA
GetSystemDirectoryA
MulDiv
CreateEventA
GetLocaleInfoW
InitializeSListHead
SetCommTimeouts
GetSystemTimeAsFileTime
ConnectNamedPipe
SetCommBreak
SetDllDirectoryW
VirtualQuery
GetCPInfo
GetThreadTimes
GetModuleFileNameA
CreatePipe
GetLocalTime
GetStartupInfoW
CreateFileW
IsProcessorFeaturePresent
GetSystemTimeAdjustment
OpenProcess
GetCurrentThread
QueryPerformanceCounter
ReadFile
EncodePointer
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
GetCommandLineA
GetCurrentThreadId
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetProcAddress
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleMode
user32
CreateDialogParamA
SendDlgItemMessageA
SetFocus
GetWindowTextLengthA
DrawFocusRect
GetWindowTextA
FlashWindow
ReleaseCapture
InsertMenuA
DestroyMenu
LoadCursorA
DialogBoxParamA
SetCursor
HideCaret
PostQuitMessage
SetKeyboardState
GetDC
CreateDialogIndirectParamA
OffsetRect
GetScrollInfo
GetWindowLongA
GetDlgItem
DestroyCaret
GetDesktopWindow
SetMenu
MessageBoxW
GetSystemMetrics
ValidateRgn
CheckMenuItem
IsRectEmpty
gdi32
CreatePolygonRgn
GetMetaFileBitsEx
GetCharacterPlacementW
CreateHatchBrush
DeleteDC
GetDIBits
ExcludeClipRect
GdiFlush
RealizePalette
SetPolyFillMode
GetTextExtentPointW
CreateBitmapIndirect
GetTextExtentPointA
CreateDIBitmap
EndDoc
GetStockObject
UpdateColors
MoveToEx
ExtFloodFill
MaskBlt
Polygon
CreatePalette
GetRegionData
SelectObject
GetPaletteEntries
CreateRectRgnIndirect
RectInRegion
CreateRectRgn
RoundRect
SelectPalette
advapi32
CopySid
OpenProcessToken
GetLengthSid
InitializeSecurityDescriptor
EqualSid
Sections
.text Size: 497KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ