Clean
Static task
static1
Behavioral task
behavioral1
Sample
a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787N.dll
Resource
win10v2004-20240802-en
General
-
Target
a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787N
-
Size
160KB
-
MD5
968b4567e1bbb4f09100418de89b90c0
-
SHA1
f09ddb77806503aa885278c2a92e5eb3e2a560f9
-
SHA256
a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787
-
SHA512
9bdec1e98a0f0fe26ecd026726f82f6ed309710adfc79fa033b6de3956723f3265da46b20fab155b00672b932739abb0051510a80df4b660eefa7a93c9d778ba
-
SSDEEP
3072:dBcJyrxHLhpvNlQ+Iyrz9GwDq1t/phHpAFhi2nugTSCTW2EVxlBjlJU/ne4VEb8n:k4NrhFNljIC99236h3uacPnxJUPe4Qm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787N
Files
-
a9b32c56f14d47e983513fcbad66171a72f6e829009d4249b1cd509bd8b07787N.dll windows:0 windows x86 arch:x86
93e218d2941e1401993af45e9295dbbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord389
ord6059
ord3229
ord5204
ord5808
ord1988
ord690
ord5356
ord800
ord500
ord772
ord540
ord823
msvcrt
wcscat
__CxxFrameHandler
malloc
free
sscanf
time
localtime
strftime
vsprintf
sprintf
strncpy
strchr
srand
rand
atoi
strcspn
strstr
_except_handler3
_CxxThrowException
tolower
toupper
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
kernel32
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
FormatMessageA
GetLocalTime
LocalFree
lstrcatA
DeviceIoControl
InterlockedIncrement
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
WinExec
SetLastError
ReleaseMutex
CreateMutexA
InterlockedExchange
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
wsprintfA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
RegEnumValueA
RegQueryInfoKeyA
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
ws2_32
WSAIoctl
ntohs
send
__WSAFDIsSet
recv
connect
setsockopt
WSACleanup
WSAStartup
socket
inet_addr
bind
ioctlsocket
select
WSAGetLastError
recvfrom
htonl
sendto
closesocket
htons
shlwapi
PathIsDirectoryA
StrStrIA
PathFileExistsA
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantInit
VariantClear
SysAllocStringByteLen
SysStringLen
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
Netbios
Exports
Exports
Sections
.text Size: - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ghv0 Size: - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ghv1 Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ