Static task
static1
Behavioral task
behavioral1
Sample
d663f6c99d299c0e985b4006d13b7a90N.dll
Resource
win7-20240729-en
General
-
Target
d663f6c99d299c0e985b4006d13b7a90N.exe
-
Size
6.5MB
-
MD5
d663f6c99d299c0e985b4006d13b7a90
-
SHA1
7390c4bfacc53c1a61dd18366f79b3cefea8b34a
-
SHA256
0cb62fdb560a5356bca2891a64ac891a493b8ef175eaf15ad371b5cf95f92dd9
-
SHA512
718ae26aa83f4a4e69431dfc7eade09ed73ca9cebefc09b2e5b17b07e7e9c84906a855ec806703ca6babddd8a3a1396410706ffa238e62c3a6edf5831febc027
-
SSDEEP
196608:ePN05gUZ8diU7NbnlrYfOToZVNy0igI7bI3q9zZNVczYK:1grpnKfOToly3kwcz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d663f6c99d299c0e985b4006d13b7a90N.exe
Files
-
d663f6c99d299c0e985b4006d13b7a90N.exe.dll windows:6 windows x86 arch:x86
b77a2203ab2a7df171ebed236c2bc0f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessA
CompareStringW
GetACP
ExitThread
WritePrivateProfileStringW
EnterCriticalSection
LoadLibraryA
GetExitCodeThread
QueryDosDeviceW
EnumResourceTypesW
FindNextFileA
IsDebuggerPresent
WinExec
CloseHandle
FileTimeToLocalFileTime
GetCurrentProcessId
GetThreadTimes
GetSystemTime
CreateFileW
Beep
DeleteFileW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetModuleFileNameW
WriteFile
FreeEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
GetOEMCP
IsValidCodePage
GetVersionExW
SizeofResource
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetEnvironmentStringsW
EnumCalendarInfoW
SetDllDirectoryW
SetErrorMode
SetEndOfFile
RtlCaptureContext
GetLocaleInfoA
TlsGetValue
SetFilePointer
CreateFileA
GetDateFormatW
GetCommandLineW
ReadConsoleW
ResumeThread
GetEnvironmentVariableW
CreateFileMappingA
FindClose
GetThreadLocale
VerifyVersionInfoW
GetPrivateProfileIntW
GetCommandLineA
GetUserDefaultLangID
VirtualQueryEx
ConnectNamedPipe
GlobalLock
HeapFree
WriteConsoleW
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
GetCurrentThreadId
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
user32
MapWindowPoints
PostMessageW
DrawTextExW
InflateRect
LoadMenuW
DestroyIcon
DestroyCursor
SendDlgItemMessageW
GetKeyboardType
CharUpperW
DestroyMenu
GetMonitorInfoW
DestroyAcceleratorTable
GetMenuStringW
CharLowerBuffW
CreateIconIndirect
GetDC
CreateDialogIndirectParamA
GetDesktopWindow
BeginDeferWindowPos
EndMenu
gdi32
GetTextExtentPoint32W
CreateHatchBrush
StretchBlt
GetRgnBox
CombineRgn
Ellipse
GetBkColor
CreateBitmapIndirect
SetStretchBltMode
SetWinMetaFileBits
CloseEnhMetaFile
CreateEnhMetaFileW
SetViewportOrgEx
SetWindowExtEx
Polygon
CreatePatternBrush
CreatePolygonRgn
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegLoadKeyW
ControlService
RegSetKeySecurity
SetSecurityDescriptorOwner
RegDeleteValueA
RegConnectRegistryW
OpenServiceW
RegSetValueExW
RegGetKeySecurity
shell32
ExtractIconExW
Shell_NotifyIconW
ole32
CoInitialize
oleaut32
SafeArrayGetLBound
SafeArrayPtrOfIndex
VariantChangeType
VariantCopy
VariantClear
Sections
.text Size: 537KB - Virtual size: 537KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ