Initialize
Static task
static1
Behavioral task
behavioral1
Sample
4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274N.dll
Resource
win10v2004-20241007-en
General
-
Target
4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274N
-
Size
80KB
-
MD5
ff6b9f4e17004fc3908769638c3111f0
-
SHA1
d580dc5d7b24d672d7ed5d5fefb5addffc9138a6
-
SHA256
4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274
-
SHA512
dc663b43add9e6aaded1780dd9644e2d79c460e7a44fb4fff14b2b78368d05fdd1ecf166af2cc4182129d7cbcfb079a2746d0b2d245b143d851024702d82c412
-
SSDEEP
1536:L2T/6NmjvXmnoJ2cPljZt01kPy8iEv2CeVEDCWmzHH8cS:LIjvWodljZt01wY8CWuch
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274N
Files
-
4493e76e81292799a593bd47b353035523907078918b4faa2dff57c4086ed274N.dll windows:4 windows x86 arch:x86
c0b8abfe88ee8d7a65dd0f9fc46b486d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
Sleep
GetCurrentProcess
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
VirtualProtect
OpenProcess
CreateThread
GetLastError
CreateMutexA
TerminateProcess
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetCommandLineA
GetVersion
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
SetFilePointer
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
RtlUnwind
user32
GetWindowTextA
EnumChildWindows
FindWindowA
GetDlgCtrlID
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
wininet
InternetConnectA
InternetReadFile
InternetCloseHandle
InternetSetOptionA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ