Static task
static1
Behavioral task
behavioral1
Sample
3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll
Resource
win7-20240903-en
General
-
Target
3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll
-
Size
6.4MB
-
MD5
ce0dee6210659c6396ab4c1fa578cf5e
-
SHA1
3e54cac3e2dae3c86908ddc0674b051bf90c1928
-
SHA256
ef1994abb84e0746c9451910c7c81cc2f2f8e7b10a1459f7f022bb4b25ed4248
-
SHA512
a7ead70f9f4783c017292ea6f7f2973b1b21b640135a9654f7bd6fc5b909f6d03373b80e61aee486b55312e81a3acec934768dcab737e6c088606fa6fce8ed73
-
SSDEEP
196608:LY4/1mssttTWe3aWdYr1h8pkCfYHjP2z4:DMZXaWda1SplfqrB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll
Files
-
3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll.dll windows:6 windows x86 arch:x86
a141a728ad54ccc342e1f100188c10d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
QueryPerformanceCounter
GetModuleFileNameA
GetModuleFileNameW
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
CloseHandle
GetOEMCP
GetACP
IsValidCodePage
GetCurrentProcessId
SetErrorMode
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
SetStdHandle
WriteConsoleW
ReadConsoleW
OutputDebugStringW
CreateFileW
SetEndOfFile
SwitchToThread
lstrcpyW
SuspendThread
WinExec
GetThreadPriority
VerifyVersionInfoW
WritePrivateProfileStringW
VirtualQueryEx
LoadResource
EnumCalendarInfoW
IsDebuggerPresent
FindResourceW
RtlCaptureContext
FindFirstFileW
GetSystemDefaultUILanguage
EncodePointer
DeleteFileW
QueryDosDeviceW
RemoveDirectoryW
LockResource
GetCPInfoExW
GetLogicalDrives
SystemTimeToTzSpecificLocalTime
GetProcessHeap
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapReAlloc
GetSystemTimeAsFileTime
HeapFree
RaiseException
RtlUnwind
HeapAlloc
GetCommandLineA
GetCurrentThreadId
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
user32
ToAsciiEx
EndPaint
SetWindowRgn
CharUpperBuffW
CharNextW
RegisterWindowMessageW
SetKeyboardState
SetCapture
GetSubMenu
GetParent
GetClientRect
GetDoubleClickTime
SetRect
SetWindowLongA
InvalidateRect
LoadMenuW
GetWindowLongW
MonitorFromWindow
IsZoomed
SetWindowLongW
EndDialog
MapWindowPoints
GetDlgCtrlID
GetCaretBlinkTime
SetScrollInfo
GetMonitorInfoW
CreateDialogParamA
PostMessageW
GetMenuItemInfoW
GetDC
GetQueueStatus
GetCapture
GetKeyboardState
GetScrollInfo
UnionRect
GetWindowTextW
PeekMessageA
GetClassNameW
ScrollWindow
RedrawWindow
GetDesktopWindow
PostMessageA
CheckRadioButton
SystemParametersInfoA
CheckMenuItem
GetDlgItem
gdi32
GetWindowOrgEx
PatBlt
SetTextColor
CreateFontA
CopyEnhMetaFileA
CreateBitmap
CreatePenIndirect
CreateCompatibleDC
GetObjectType
GetCharABCWidthsFloatA
GetClipBox
RoundRect
GetPixel
UpdateColors
CreateSolidBrush
MoveToEx
SelectObject
PolyPolyline
CreateRectRgnIndirect
RealizePalette
EndDoc
GetBitmapBits
comdlg32
FindTextW
advapi32
GetLengthSid
RegUnLoadKeyW
GetUserNameA
RegConnectRegistryW
QueryServiceStatus
RegGetKeySecurity
InitializeSecurityDescriptor
RegQueryInfoKeyW
AllocateAndInitializeSid
ChangeServiceConfigW
shell32
CommandLineToArgvW
SHGetFileInfoW
oleaut32
SafeArrayGetUBound
SafeArrayCreate
SysAllocStringLen
Sections
.text Size: 520KB - Virtual size: 519KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 26.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ