Static task
static1
Behavioral task
behavioral1
Sample
11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8.dll
Resource
win10v2004-20240802-en
General
-
Target
11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8
-
Size
6.5MB
-
MD5
65db12334fab139f4a162b51d5ebc8cb
-
SHA1
9d13041f729388526c25346b44bb7e338237d411
-
SHA256
11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8
-
SHA512
a1be6d0c4b062a3f387380975b380d7b7d149d7c856c4ce634e871339d3a4c549c3c2854f2520523ca7ae81e9a808f64495cda77c224e2788aa28295dc9e578f
-
SSDEEP
196608:5gq2dQbVSsxe32cVD85UGvyfK1tWszs76Z:iXcVwmcVI5UGyK1sszs76Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8
Files
-
11c5dc74f77d443abcc14c8c9402d8480892fbf2b1aa060201e18907276fa0d8.dll windows:6 windows x86 arch:x86
9846c28f485da5271d1d28a1e186d302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLogicalDrives
ConnectNamedPipe
GetPrivateProfileStringW
GetProcessTimes
OpenProcess
GetConsoleCP
IsValidLocale
Sleep
GetFileAttributesA
Beep
GetModuleFileNameW
GetTimeZoneInformation
FlushFileBuffers
GetTempPathW
GetPrivateProfileIntW
SetThreadLocale
GetLastError
FindClose
ResetEvent
QueryDosDeviceW
VirtualProtect
GetUserDefaultUILanguage
EnumSystemLocalesW
SuspendThread
ResumeThread
CreateDirectoryW
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
ReadFile
GetConsoleMode
CloseHandle
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
LoadResource
FreeLibrary
FindFirstFileW
EncodePointer
SwitchToThread
GetThreadTimes
GetStringTypeW
IsDebuggerPresent
CreateEventW
EnumResourceNamesW
MulDiv
HeapDestroy
GetVersionExW
WideCharToMultiByte
TlsSetValue
GetUserDefaultLangID
VirtualQueryEx
GetSystemTimeAsFileTime
WaitForSingleObjectEx
GetModuleHandleExW
GetCommState
SystemTimeToFileTime
CreateThread
GetProcessHeap
HeapSize
ExitProcess
GetUserDefaultLCID
GetLocaleInfoW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
MultiByteToWideChar
HeapReAlloc
RaiseException
RtlUnwind
HeapFree
GetCommandLineA
GetCurrentThreadId
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
LCMapStringW
user32
GetDlgItemInt
CharNextW
RegisterWindowMessageW
GetSubMenu
LoadStringA
ModifyMenuW
PostMessageW
InsertMenuW
SetWindowTextW
SetMenuItemInfoW
CopyRect
GetWindowThreadProcessId
GetDC
DrawFocusRect
GetMenu
MonitorFromWindow
GetDesktopWindow
ValidateRgn
GetDlgCtrlID
ToUnicode
EnableScrollBar
gdi32
SetTextColor
PlayEnhMetaFile
SetROP2
CreateEnhMetaFileW
Polygon
GetRegionData
PtInRegion
Ellipse
SetPolyFillMode
StretchDIBits
CloseEnhMetaFile
SetViewportExtEx
comdlg32
GetSaveFileNameW
advapi32
RegSetValueExW
RegEnumKeyExW
RegConnectRegistryW
RegGetKeySecurity
RegDeleteValueA
RegOpenKeyExA
OpenProcessToken
shell32
Shell_NotifyIconW
oleaut32
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 550KB - Virtual size: 550KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 37.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ