method
Static task
static1
Behavioral task
behavioral1
Sample
e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527N.dll
Resource
win10v2004-20240802-en
General
-
Target
e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527N
-
Size
148KB
-
MD5
238fc77cfa62732331fbe8063cd07e00
-
SHA1
bb593273580a160146d6ebecd00c92ffd9b27025
-
SHA256
e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527
-
SHA512
c4edb0cf51ce24acc1f5f22d9d134f0abdd4ba704bfbd64852335c50567d71557a6bd31663fec1cf1f736bbb211ad4dcd5d6be107bf05e8a843086d80dad7184
-
SSDEEP
3072:VniPfUkOBCPiik5qOu5p/X+HB2n1Zn4419dYOfkYbR:1i38Bb5qOWlX+HY1Zn40958Yl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527N
Files
-
e6b31590ae1a889c8f520fe834b213fa1aab76558b224758d65a4ddbecef0527N.dll windows:0 windows x86 arch:x86
ac79b1861cf5da0c9d8ed6e84c90ec97
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord389
ord6059
ord3229
ord5204
ord5808
ord1988
ord690
ord5356
ord800
ord540
ord772
ord500
ord823
msvcrt
strstr
malloc
free
wcscat
time
localtime
strftime
vsprintf
sprintf
__CxxFrameHandler
sscanf
strncpy
strchr
srand
rand
atoi
strcspn
_except_handler3
_CxxThrowException
tolower
toupper
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
_strcmpi
wcslen
kernel32
FreeLibrary
LocalAlloc
LocalFree
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
FormatMessageA
GetLocalTime
lstrcatA
DeviceIoControl
InterlockedIncrement
InterlockedExchange
CreateMutexA
ReleaseMutex
SetLastError
WinExec
GetSystemDirectoryA
GetLastError
MultiByteToWideChar
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
GetVersionExA
GlobalAlloc
GlobalFree
VirtualQueryEx
ReadProcessMemory
CreateDirectoryA
WriteProcessMemory
GetSystemInfo
InterlockedDecrement
GetFileSize
ReadFile
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
RaiseException
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jlasd0 Size: - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.jlasd1 Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ