dll
Static task
static1
Behavioral task
behavioral1
Sample
79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99.dll
Resource
win10v2004-20240802-en
General
-
Target
79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99
-
Size
1.5MB
-
MD5
81f2e376bdfd399c43093ac0aac19700
-
SHA1
15effd1e02785e4187c2041a9f0cf2e6d2114149
-
SHA256
79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99
-
SHA512
11fed1787bff72f3d5f0996de210375c0c66a6eea7ff96ccbd5a75d75d1966cd8d1904ba7658b35b69cb5bde398aa9bff3303180e8fad75be77584bc42ebc564
-
SSDEEP
24576:GIX/MH2tnaImTRdRfI6VVQn2lIYf0Pt8ELBCgb08jWADCN24hIcP5E/:GIX/g7Qn2APtDjONfP8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99
Files
-
79a624ecea69464434b1125a49d7297e46d924eb407f51eac943278c631b2e99.dll windows:4 windows x86 arch:x86
76256cd620d63cae086abf39ace03b3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
ws2_32
inet_addr
recvfrom
inet_ntoa
connect
recv
getpeername
accept
gethostbyname
WSAStartup
WSACleanup
select
send
closesocket
WSAAsyncSelect
htons
ioctlsocket
socket
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetTimeZoneInformation
GetVersion
TerminateThread
VirtualAlloc
VirtualFree
IsBadReadPtr
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpyn
GetExitCodeThread
CreateMutexA
ReleaseMutex
OpenFileMappingA
GetLocalTime
LCMapStringA
FlushFileBuffers
RtlUnwind
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
RaiseException
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
OpenProcess
TerminateProcess
GetCurrentProcess
GetFileSize
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateSemaphoreA
ResumeThread
InterlockedExchange
CompareStringW
CompareStringA
SetEnvironmentVariableA
HeapSize
GetSystemTime
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
LocalReAlloc
GlobalHandle
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CreateDirectoryA
GetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
WaitForMultipleObjects
CreateFileA
DeviceIoControl
SetEvent
FindResourceA
LoadResource
LockResource
ReadFile
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameA
FreeLibrary
LoadLibraryA
GetLastError
GetVersionExA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetComputerNameA
CreateThread
CreateEventA
GlobalUnlock
Sleep
GlobalAlloc
GlobalLock
IsBadWritePtr
user32
GetDlgItem
FindWindowA
GetWindowThreadProcessId
GetClassNameA
GetDesktopWindow
GetClipboardData
LoadIconA
TranslateMessage
DrawFrameControl
GetWindowTextA
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CloseClipboard
wsprintfA
SetClipboardData
DrawEdge
OpenClipboard
GetForegroundWindow
EmptyClipboard
GetSystemMetrics
GetCursorPos
GetSysColorBrush
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
SystemParametersInfoA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
GetSystemMenu
DeleteMenu
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
LoadStringA
UnregisterClassA
GetMenuCheckMarkDimensions
GetMenuState
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
gdi32
ExtSelectClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
GetViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
CreateRectRgnIndirect
SetBkColor
CreateDCA
StartDocA
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
ole32
CLSIDFromString
OleUninitialize
OleInitialize
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
comctl32
ord17
ImageList_Destroy
comdlg32
ChooseColorA
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
Exports
Exports
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ