Static task
static1
Behavioral task
behavioral1
Sample
2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae.dll
Resource
win10v2004-20240802-en
General
-
Target
2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae
-
Size
15.7MB
-
MD5
e64b7bdcd746ff7e9dd0cd5e6d75f7f2
-
SHA1
358be358824037315b79c9a3a6247a2d89613f11
-
SHA256
2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae
-
SHA512
b292a5c40257a60a8caee148cef3181f91cbf921fd590086ee880c010ca7b655d33a2fe19386ef7fb86ec842b38e61d2c96bd81dc1c9c00d76997623aa29029d
-
SSDEEP
49152:0D3LngFjHUNXvmX9s4M+lYOpdW84sdLvtBog/J:07Lg50Z+X24Z6C48mg/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae
Files
-
2bd00488c6505081b6a456f1808a6a47f0e7a520dbb281d08bdcbe562f0569ae.dll windows:6 windows x86 arch:x86
6095224769ea5d185867e2128d01036d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FindClose
FindFirstFileA
FindNextFileA
Sleep
GetTickCount
IsBadReadPtr
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateThread
GetFileAttributesA
GetTempPathW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
FlushInstructionCache
OpenProcess
VirtualProtect
ReadProcessMemory
WriteProcessMemory
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
K32EnumProcessModules
K32GetModuleFileNameExW
GetStdHandle
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleScreenBufferSize
CreateFileA
ReadFile
WriteFile
OutputDebugStringA
GetLastError
ConnectNamedPipe
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateNamedPipeA
WaitNamedPipeA
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualAlloc
VirtualFree
LoadLibraryA
lstrlenW
GetThreadLocale
QueryPerformanceCounter
WriteConsoleW
HeapSize
CreateFileW
SetEnvironmentVariableW
FreeEnvironmentStringsW
SetEndOfFile
GetStringTypeW
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
RtlUnwind
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
SetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
GetFileSizeEx
SetFilePointerEx
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
mpr
WNetGetUniversalNameW
Sections
.text Size: 15.6MB - Virtual size: 15.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ