Static task
static1
Behavioral task
behavioral1
Sample
8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll
Resource
win10v2004-20240802-en
General
-
Target
8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9
-
Size
1.1MB
-
MD5
16769924b2b8403bce849e2e4407f7ab
-
SHA1
9c281ec63598e36e697479e789f3fcee396d24c8
-
SHA256
8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9
-
SHA512
97bc54f3ce16f2abee75e5e3d938630cdd1229127e8385bec4eac4c641c59bc1aaf3a9fc90e730223cba98a7210dffcd6d870d1857a8a7070083c119ed11e57a
-
SSDEEP
12288:jxOkywPx9xADWfhjcz3eq/KDQH/NDpkO8Ii1cZ5Z6oNSdBN/i5zzaK6qaGXn3Hgp:jMv09iCRtq/KDQH/0dIiaZ5ZRcln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9
Files
-
8737631f44d6ed2fbe554c2d4e243cffe82beda218acf4d00e0863c19d79cce9.dll windows:4 windows x86 arch:x86
b97bffe876190b0e87d6f72d3ca30e9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCommandLineA
GetProcessHeap
ExitProcess
HeapSize
GetTimeZoneInformation
GetACP
Sleep
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
VirtualQuery
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
GetSystemInfo
VirtualProtect
HeapReAlloc
HeapAlloc
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapFree
GetDateFormatA
GetTimeFormatA
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
LocalFileTimeToFileTime
SizeofResource
FileTimeToLocalFileTime
CreateFileA
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CloseHandle
InterlockedDecrement
lstrcpyA
lstrcpyW
GetCurrentProcessId
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
LocalUnlock
LocalLock
MoveFileExA
GetSystemDirectoryA
CreateFileW
GetVersionExA
lstrcmpA
GlobalReAlloc
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetStringTypeExA
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
lstrlenW
GetVersion
MultiByteToWideChar
InterlockedExchange
CopyFileA
VirtualAlloc
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
GetEnvironmentStringsW
user32
CreateMenu
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
CharNextA
DestroyIcon
UnregisterClassA
GetMenuItemInfoA
InflateRect
GetSysColorBrush
SetParent
GetSystemMenu
DeleteMenu
IsZoomed
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
DestroyCursor
ReleaseCapture
LoadCursorA
SetCapture
KillTimer
SetTimer
SetWindowRgn
DrawIcon
IsRectEmpty
FindWindowA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetRect
InvalidateRect
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
PostThreadMessageA
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
ReleaseDC
GetDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetClientRect
GetMenu
GetTabbedTextExtentA
WindowFromPoint
GetDCEx
LockWindowUpdate
RegisterClipboardFormatA
SetCursor
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetFocus
SetWindowPos
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetDesktopWindow
GetWindowTextLengthA
GetWindowTextA
GetParent
GetScrollPos
SetScrollPos
GetWindow
GetWindowLongA
SetFocus
IsWindow
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
CharUpperA
LoadIconA
CloseWindow
UpdateWindow
SendMessageA
EnableWindow
wsprintfA
gdi32
GetTextExtentPoint32A
GetCharWidthA
CreateFontA
StretchDIBits
CreateFontIndirectA
SetRectRgn
CombineRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetNearestColor
GetTextMetricsA
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceA
GetWindowOrgEx
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
GetViewportOrgEx
Ellipse
LPtoDP
CreateEllipticRgn
CreateSolidBrush
CreatePen
GetBkMode
SetAbortProc
CreatePatternBrush
ExtSelectClipRgn
GetCurrentPositionEx
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
DeleteObject
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
DeleteDC
EndDoc
AbortDoc
GetDeviceCaps
CreateDCA
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
CreateRectRgnIndirect
PatBlt
DPtoLP
StartDocA
StartPage
EndPage
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
GetJobA
ClosePrinter
advapi32
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegCloseKey
GetUserNameA
RegCreateKeyA
shell32
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragFinish
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRevokeClassObject
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
OleInitialize
oleaut32
VariantTimeToSystemTime
SysAllocString
OleCreateFontIndirect
SafeArrayDestroy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
VarBstrFromDate
SysFreeString
SystemTimeToVariantTime
VariantCopy
odbc32
ord8
ord72
ord4
ord17
ord41
ord10
ord2
ord1
ord15
ord9
ord14
ord3
ord16
ord20
ord5
ord48
ord49
ord11
ord19
ord12
ord46
ord18
ord13
ord59
ord43
ord68
ord44
ord45
ord50
ord51
Sections
.text Size: 764KB - Virtual size: 761KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ