Control_RunDLL
Static task
static1
Behavioral task
behavioral1
Sample
06a20757d1988ed84aeca1ef9564c0671b55e1b0d03fc022f155502fc7340861.dll
Resource
win7-20240729-en
General
-
Target
5c35cc8d81487b8a17577f528a95be937ddd535a70b511b0e0236b9e57e5d3d5
-
Size
184KB
-
MD5
873ba9f2295f4dc705f3d9aafc31f1a6
-
SHA1
3da9f1e925d969efddb991d4bc986f4d6f3c9e57
-
SHA256
5c35cc8d81487b8a17577f528a95be937ddd535a70b511b0e0236b9e57e5d3d5
-
SHA512
3474c1c5a9d8c372d53d49f4ae4bcc507ccd8880bd04290e855d83a91e492b4c273d4d761f73549c51a14f47d514856cada2252f57e4e15db6f7d98102327d07
-
SSDEEP
3072:1C+s4KGuy2sgIz8T5WaHI8fuZ3LslMRJSXb2c/oNQNuqCcWFx4erZUci:04KGaT5WyIrZ77SXb27+NFWFx4eUN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/06a20757d1988ed84aeca1ef9564c0671b55e1b0d03fc022f155502fc7340861
Files
-
5c35cc8d81487b8a17577f528a95be937ddd535a70b511b0e0236b9e57e5d3d5.zip
Password: infected
-
06a20757d1988ed84aeca1ef9564c0671b55e1b0d03fc022f155502fc7340861.dll windows:6 windows x86 arch:x86
822ae775303d14fd9c529b33f0deaf77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualProtect
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
LCMapStringW
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStringTypeW
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
HeapSize
CloseHandle
CreateFileW
WriteConsoleW
DecodePointer
Exports
Exports
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ