Static task
static1
Behavioral task
behavioral1
Sample
e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f.dll
Resource
win10v2004-20241007-en
General
-
Target
e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f
-
Size
272KB
-
MD5
3001a90ccbe6922e2de0449dddf245a2
-
SHA1
907dd10ff8c6f71384b511426b529c749e2d766e
-
SHA256
e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f
-
SHA512
bd7c4dcd58d07bb98105c3192442af736160c77d0b54e25189167f52d29b6b16f8ea266683e3cc6f64640c8ea0a6a89fbb3c983f8ef3030f9a5accc1a635489f
-
SSDEEP
1536:dIkZz25SSuPUkeuHesKY0UTcyVoA1kHSjBRFRz2hgSFDYe4O8mG1Zj19s8rIfmBE:ukt+SSUTe1EN1zBI42nJIW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f
Files
-
e6de74a2415b4e6cac2bba1cb1b146b7e7367539f3b538815782312c2f48b54f.dll regsvr32 windows:4 windows x64 arch:x64
8330828bd6a8874e0d6c6c7dbccbc29c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
CloseHandle
CreateEventW
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
EnumResourceNamesW
FindResourceW
FormatMessageW
GetEnvironmentVariableW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetTickCount
GetTickCount64
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSectionEx
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
LoadResource
MultiByteToWideChar
SetEvent
SizeofResource
WaitForSingleObject
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__stdio_common_vsprintf
_strdup
_wcsdup
calloc
free
fwrite
getenv
malloc
memcmp
memmove
realloc
strchr
strcmp
strcspn
strlen
user32
CreateDialogParamW
DestroyWindow
DispatchMessageW
EnableWindow
GetAncestor
GetDlgItem
GetMessageW
GetWindowLongPtrW
GetWindowLongW
IsDialogMessageW
IsWindow
LoadStringW
PostThreadMessageW
SendDlgItemMessageW
SendMessageW
SetDlgItemTextW
SetWindowLongPtrW
SetWindowLongW
SetWindowTextW
ShowWindow
TranslateMessage
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 4KB - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 368B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 273B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ