Group
Static task
static1
Behavioral task
behavioral1
Sample
b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365N.dll
Resource
win10v2004-20240802-en
General
-
Target
b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365N
-
Size
148KB
-
MD5
438cbd06f974a4b2e7786acd33b2c340
-
SHA1
d5e261e8818d079a710cf3287553751d094775d5
-
SHA256
b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365
-
SHA512
5e7c7ea82005ac8328041a77c7238563146717adf19d32cfb5a5b2adc3da5dd07653c2e68390a035d8dc2089cc7dc1517f90e487441821ee71b393da66767c99
-
SSDEEP
3072:WffvMX430BMYTM+Ed543Wtt4KGLez3u5KHeuidKL8v/TLQi8aBJLXBlcfwcisk:kXMX46TMPd5uWttae9HeuiKazjJFlcfC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365N
Files
-
b46b1d40c69f81d517159a9c69a87ff471785d8581c8568b90dc7b04ff15e365N.dll windows:0 windows x86 arch:x86
93e218d2941e1401993af45e9295dbbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord389
ord6059
ord3229
ord5204
ord5808
ord1988
ord690
ord5356
ord800
ord500
ord772
ord540
ord823
msvcrt
wcscat
__CxxFrameHandler
malloc
free
sscanf
time
localtime
strftime
vsprintf
sprintf
strncpy
strchr
srand
rand
atoi
strcspn
strstr
_except_handler3
_CxxThrowException
tolower
toupper
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
kernel32
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
FormatMessageA
GetLocalTime
LocalFree
lstrcatA
DeviceIoControl
InterlockedIncrement
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
WinExec
SetLastError
ReleaseMutex
CreateMutexA
InterlockedExchange
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
wsprintfA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
RegEnumValueA
RegQueryInfoKeyA
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
ws2_32
WSAIoctl
ntohs
send
__WSAFDIsSet
recv
connect
setsockopt
WSACleanup
WSAStartup
socket
inet_addr
bind
ioctlsocket
select
WSAGetLastError
recvfrom
htonl
sendto
closesocket
htons
shlwapi
PathIsDirectoryA
StrStrIA
PathFileExistsA
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantInit
VariantClear
SysAllocStringByteLen
SysStringLen
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
Netbios
Exports
Exports
Sections
.text Size: - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pmd0 Size: - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pmd1 Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ