Interface
Static task
static1
Behavioral task
behavioral1
Sample
3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6N.dll
Resource
win10v2004-20241007-en
General
-
Target
3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6N
-
Size
168KB
-
MD5
456f14a8920d3218e687c1602f095140
-
SHA1
c450f8e05641cd284c57f1936e723a216cbd3a00
-
SHA256
3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6
-
SHA512
9b01e35998ef651c50e80d927747ca2e56c62c918d603a4f9c8e494f8307879aec6b2883cf07d685437c04ba722d9a5e0c19c9c31384979ad9d20703040ed6e9
-
SSDEEP
3072:S25S8qsPfVoCxEI5GRycgzQkf2+JKC8L1MwwYsg89R5gZMM:SJ8T1xE3ocg9f2nfLnwYsxf2ZN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6N
Files
-
3aa1b372683f50b23fa72d7d338e0f79cf400786ac55663b852117f94981bfb6N.dll windows:0 windows x86 arch:x86
1cb44e3fd2b456c57ddbbc34a99f6c10
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord825
ord6059
ord389
ord3229
ord5204
ord5808
ord500
ord772
ord540
ord800
ord5356
ord690
ord1988
ord823
msvcrt
rand
strchr
strncpy
sscanf
__CxxFrameHandler
wcscat
memcpy
malloc
free
_strnicmp
strcpy
srand
memcmp
_stricmp
strrchr
strcat
time
localtime
strftime
vsprintf
sprintf
strlen
memset
atoi
strcspn
strstr
_except_handler3
_CxxThrowException
tolower
toupper
strcmp
wcscpy
strncat
calloc
_mbsstr
_mbsnbcpy
_strcmpi
wcslen
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_memicmp
kernel32
CreateToolhelp32Snapshot
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
FormatMessageA
CreateProcessA
GetLocalTime
VirtualQuery
lstrcatA
DeviceIoControl
SetFileAttributesA
MoveFileA
LocalFree
Process32First
lstrcmpiA
DebugActiveProcess
Process32Next
ExpandEnvironmentStringsA
GetModuleHandleA
InterlockedIncrement
CopyFileA
InterlockedExchange
CreateMutexA
ReleaseMutex
SetLastError
WinExec
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
TerminateThread
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
DuplicateHandle
FreeLibrary
FindClose
FindNextFileA
FindFirstFileA
ReadFile
GetFileSize
InterlockedDecrement
GetSystemInfo
WriteProcessMemory
CreateDirectoryA
ReadProcessMemory
VirtualQueryEx
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetDesktopWindow
wsprintfA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
RegQueryInfoKeyA
RegEnumValueA
CreateServiceA
RegCreateKeyA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
ws2_32
inet_addr
htonl
sendto
closesocket
WSACleanup
send
__WSAFDIsSet
recv
connect
setsockopt
WSAIoctl
WSAStartup
socket
htons
ntohs
bind
ioctlsocket
select
recvfrom
WSAGetLastError
shlwapi
PathIsDirectoryA
PathFileExistsA
StrStrIA
ntdll
NtQueryInformationFile
NtQuerySystemInformation
psapi
GetModuleFileNameExA
ole32
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoInitialize
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayGetVartype
SafeArrayAccessData
SafeArrayUnaccessData
VariantChangeType
SysAllocStringByteLen
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocString
VariantInit
SysStringLen
VariantClear
msvcp60
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
netapi32
Netbios
Exports
Exports
Sections
.text Size: - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.KJ0 Size: - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.KJ1 Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ