Static task
static1
Behavioral task
behavioral1
Sample
eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d.dll
Resource
win10v2004-20240802-en
General
-
Target
eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d
-
Size
247KB
-
MD5
c1d474229b992e0d45bce1498c96de0c
-
SHA1
2893c8000b2265ae63c05f52ff5b447c7e349d63
-
SHA256
eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d
-
SHA512
15e0a26d79cf2c891f414b93f7886ce01c612d1824b95ac6d32627779486c824a2476f53ef27fb1c6df0d1f8c976dffd275b94e71e905a4bf0a256a06d98c598
-
SSDEEP
6144:Hp3myfBsgunSBeYBiT1aiJ1dread1crmVt:IgeQehacTreg1h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d
Files
-
eea98b06fc8b527d992af2fd70ebf55958b282d4c37f9674c63d87d056afc15d.dll windows:6 windows x64 arch:x64
609afc6ec20101db42db0b2669c274ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameW
MultiByteToWideChar
GlobalFlags
CloseHandle
GetSystemInfo
GetCurrentDirectoryW
SetCurrentDirectoryW
GetCurrentProcessId
GetModuleHandleW
WideCharToMultiByte
VirtualQuery
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
InitializeSListHead
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
FreeLibrary
GetProcAddress
LoadLibraryW
TerminateProcess
DeleteCriticalSection
FindResourceW
LoadResource
LockResource
FreeResource
GetCurrentThreadId
InitializeCriticalSection
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
LeaveCriticalSection
EnterCriticalSection
user32
LoadStringW
LoadImageW
GetDesktopWindow
ReleaseDC
GetDC
MonitorFromWindow
MessageBoxW
LoadIconW
LoadCursorW
gdi32
SetDIBColorTable
CreateDIBSection
SelectObject
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
ole32
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
gdiplus
GdipGetImagePixelFormat
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImagePaletteSize
GdipGetImagePalette
GdiplusStartup
GdipCloneImage
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipGetImageGraphicsContext
GdipDrawImageRectI
GdipFree
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
GdiplusShutdown
ws2_32
WSACleanup
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
memcmp
__std_type_info_destroy_list
_CxxThrowException
memset
__C_specific_handler
wcsrchr
wcsstr
wcschr
memmove
api-ms-win-crt-string-l1-1-0
isprint
strncmp
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_cexit
_execute_onexit_table
_seh_filter_dll
exit
_initterm_e
_invalid_parameter_noinfo
_errno
_initterm
_crt_atexit
_configure_narrow_argv
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
api-ms-win-crt-heap-l1-1-0
free
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ