o.pdb
Static task
static1
Behavioral task
behavioral1
Sample
550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4fN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4fN.dll
Resource
win10v2004-20240802-en
General
-
Target
550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4fN
-
Size
68KB
-
MD5
fbb00b965aee4f0f07f5cd25c6a54e30
-
SHA1
c1777a2f6e62a3e1c59d8c92ea8a97c9b3cee8f3
-
SHA256
550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4f
-
SHA512
610e9609cdfea2e8461ec21b1a30432a1c533ab3d76b991b21a2f8a47e4729e712019759c8020930ee6912da763863ad077ba9c0504bea214b38ceb18c1a8989
-
SSDEEP
1536:yxx6Wuq76LBIQ9VDbFELTbCc3lbOQrP7U3WojV1aL:yxxJuE6LKQ9VVEWc3lbLrPVSV1aL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4fN
Files
-
550bcd04af90a32702e1b7dc87d3f51c33e013bf21bbc7029921607510e3af4fN.dll windows:4 windows x86 arch:x86
c83e31f147406ba2fd50815231a27c51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ExitProcess
SetEvent
OpenEventW
SetCurrentDirectoryW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindFirstFileW
FindClose
GetLocalTime
CreateThread
DeviceIoControl
SetErrorMode
GetVolumeInformationW
GetDiskFreeSpaceW
GetCommandLineW
GetDriveTypeW
SetVolumeLabelW
GetEnvironmentVariableW
Sleep
CloseHandle
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetLastError
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
lstrcpyA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetVersion
GetCommandLineA
RtlUnwind
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
ExitThread
GetProcessHeap
msvcrt
memset
Exports
Exports
zhbn
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ