Static task
static1
Behavioral task
behavioral1
Sample
6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91N.dll
Resource
win10v2004-20240802-en
General
-
Target
6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91N
-
Size
4.8MB
-
MD5
5999c109d12e1feb2ffe8263f04d2920
-
SHA1
1fcacd5907d103962073ecac0a264ee262f4bee2
-
SHA256
6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91
-
SHA512
aac80b34a9156116870663d9a63fcb3a03ace7b113baa7b9c88eafb669d4304c6f775422653ebdb6621e36c6d65fd1bee110fa9aa88b6193dd568be447436d02
-
SSDEEP
98304:BEo7Z3SHAqTgk8coH6RRIo3U9T09Bzj6dwm6S+wQIuzUv97Qhr52JUFF:B5Z3qAq0cth3U9u2Z6S3nuE9Mhb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91N
Files
-
6b0c1b2f41972be5c78a9668b430b8414ef97f504e3ee104988ffbe602e92c91N.dll windows:6 windows x64 arch:x64
72764bb12543146853a3f0e5a8e58dec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetQueuedCompletionStatus
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
FindWindowA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
CryptReleaseContext
shell32
SHGetSpecialFolderPathA
ole32
CoSetProxyBlanket
oleaut32
VariantInit
ws2_32
WSAStartup
shlwapi
PathCombineA
userenv
UnloadUserProfile
iphlpapi
GetAdaptersInfo
mpr
WNetGetProviderNameA
ntdll
RtlCaptureContext
wevtapi
EvtOpenLog
Sections
.text Size: - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ecct Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1000KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.snark0 Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.snark1 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ