Static task
static1
Behavioral task
behavioral1
Sample
1016db4f97731b7e6c5525193953a2be8c00057c6fdcfe32b1eea481db51b8a4.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1016db4f97731b7e6c5525193953a2be8c00057c6fdcfe32b1eea481db51b8a4.dll
Resource
win10v2004-20240802-en
General
-
Target
5d6fd6e0cec68171668fd00d20054a15.zip
-
Size
40KB
-
MD5
05e441386e61e6c4350d8d1c404323ac
-
SHA1
6c3be0318f78f09701ed53e15cd0c336e998f421
-
SHA256
1efb99cc314e44797d5681d486f5d4188f55f7c795d86a2ed49f1763445bde8e
-
SHA512
88059472df8fdc93cfa8afe1d4c5044f6ff0169e1ea275b28ce7f3a221b5e55619cba69dd7ea35dbe52a0c00de9eca8483fc52d203e1e99a08c648a23a779366
-
SSDEEP
768:U0EqNbPiGbJM9mYJe5KsHGOeoUGLwPyYf7GqNBMEkSpbSV2aCLTgwAipL5Ct0xe8:xEqN28JCQRHO9GLEf71ahabSV6gwnN+g
Malware Config
Signatures
Files
-
5d6fd6e0cec68171668fd00d20054a15.zip.zip
Password: infected
-
1016db4f97731b7e6c5525193953a2be8c00057c6fdcfe32b1eea481db51b8a4.dll windows:6 windows x86 arch:x86
Password: infected
939c925ad24b5326d66117cd864242ee
Code Sign
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation2e:ab:11:dc:50:ff:5c:9d:cb:c0Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before22/08/2007, 22:31Not After25/08/2012, 07:00SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:0f:78:4d:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/08/2007, 00:23Not After23/02/2009, 00:33SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:49:7c:ed:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:55Not After16/09/2011, 02:05SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:10D8-5847-CBF8,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:25:ab:11:db:45:1f:58:7a:67:a2Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before16/09/2006, 01:04Not After15/09/2019, 07:00SubjectCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
b5:67:01:71:5c:be:a1:26:14:62:02:10:21:de:e6:d6:80:59:2d:47Signer
Actual PE Digestb5:67:01:71:5c:be:a1:26:14:62:02:10:21:de:e6:d6:80:59:2d:47Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
X3DAudio1_5.pdb
Imports
msvcrt
_adjust_fdiv
_amsg_exit
_initterm
free
malloc
_XcptFilter
_CIacos
kernel32
GetCurrentThreadId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
IsProcessorFeaturePresent
GetTickCount
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
MessageBoxA
Exports
Exports
X3DAudioCalculate
X3DAudioInitialize
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ