Static task
static1
Behavioral task
behavioral1
Sample
0663d0db038085bc1bc5c415551ace00N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0663d0db038085bc1bc5c415551ace00N.dll
Resource
win10v2004-20240802-en
General
-
Target
0663d0db038085bc1bc5c415551ace00N.exe
-
Size
3.0MB
-
MD5
0663d0db038085bc1bc5c415551ace00
-
SHA1
ca9b18f165a05f829ffca5477ec6af71f22333c8
-
SHA256
1ae3741b05db5ee61e4ae7ee02092e744f1adac68bedaf32cd9e77ea8252c00d
-
SHA512
d28a2ecdd8e1ef1391513ef8f93eee4e88e70a832326154cfd2a1f92ccd8b0a5e571da64cf9dafd3e4657376acd7bfd71c14dadfecc53fbb8d15f09d7b90d591
-
SSDEEP
98304:a7I6fs9h9Nr5yOArosRusY/NwCJPW6bG:aE6S9Nlo0sfCBW6bG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0663d0db038085bc1bc5c415551ace00N.exe
Files
-
0663d0db038085bc1bc5c415551ace00N.exe.dll windows:6 windows x64 arch:x64
683886d04bd105755f6d65a787fb58c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GlobalLock
GlobalUnlock
LoadLibraryA
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
HeapAlloc
GetThreadContext
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
GetFileType
GetStdHandle
EnumSystemLocalesW
GlobalFree
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TerminateProcess
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
GlobalAlloc
WideCharToMultiByte
ReadProcessMemory
GetProcAddress
CreateThread
GetTickCount64
OpenProcess
GetModuleHandleA
GetCurrentProcess
MultiByteToWideChar
GetModuleFileNameW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
InterlockedFlushSList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetStringTypeW
LCMapStringEx
DecodePointer
EncodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileInformationByHandleEx
ReadFile
CreateFileW
PeekNamedPipe
WriteFile
GetUserDefaultLCID
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
LocalFree
FormatMessageA
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
RtlUnwind
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SendMessageA
GetForegroundWindow
WindowFromDC
CallWindowProcA
GetAsyncKeyState
GetCursorPos
ScreenToClient
keybd_event
GetWindowRect
GetWindowThreadProcessId
SetClipboardData
SetWindowLongPtrA
SendInput
WindowFromPoint
GetClipboardData
GetKeyState
GetMessageExtraInfo
LoadCursorA
GetCapture
ClientToScreen
TrackMouseEvent
SetCapture
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
advapi32
GetTokenInformation
RegSetValueExW
RegCreateKeyExW
RegCloseKey
GetCurrentHwProfileA
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetSidIdentifierAuthority
shell32
ShellExecuteExW
ShellExecuteA
opengl32
glPopMatrix
glPolygonOffset
glPopAttrib
glEnable
glVertex3f
glDepthMask
glLoadMatrixf
glEnd
glMatrixMode
glLineWidth
glColor3f
glBlendFunc
glLoadIdentity
glHint
glAlphaFunc
glPushAttrib
glShadeModel
glGetFloatv
glPushMatrix
glDisable
glColor4f
glScaled
glVertex3d
glTranslatef
glBegin
winmm
PlaySoundA
ws2_32
htons
WSACleanup
closesocket
inet_pton
WSAStartup
send
socket
connect
recv
imm32
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
ImmSetCompositionWindow
Sections
.text Size: - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 809KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Y~t Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.iR Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.9I< Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 937B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ