DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4bc088868d3c93b104d6e92685212e8647377e764dc971e862a8fa7247c74ee1.dll
Resource
win7-20240903-en
General
-
Target
4bc088868d3c93b104d6e92685212e8647377e764dc971e862a8fa7247c74ee1
-
Size
610KB
-
MD5
98bb651b6802df594767885a16a39269
-
SHA1
452e4961b394f727ad15355cdd46213be54a2e78
-
SHA256
4bc088868d3c93b104d6e92685212e8647377e764dc971e862a8fa7247c74ee1
-
SHA512
27caf900adcab3911f4db4a9bcafef96fa66eedced064654c05a5c16bef0fb4936eefc5fd78b38d0530477382d1ae6fa16b8a136f5804e4c8b68594e2e8dd57d
-
SSDEEP
12288:+hcyNpc2d8YyI1+ZTk9W2RmZOVu5giuk9HNlBVWuEPSP:WcyN+Yt1+ZTk42Aks5ukTHV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4bc088868d3c93b104d6e92685212e8647377e764dc971e862a8fa7247c74ee1
Files
-
4bc088868d3c93b104d6e92685212e8647377e764dc971e862a8fa7247c74ee1.dll regsvr32 windows:4 windows x64 arch:x64
c8b77efc5506956df0c3cf3c75b628ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
HeapAlloc
HeapReAlloc
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
FlsSetValue
GetCommandLineA
GetProcessHeap
HeapSize
HeapSetInformation
HeapCreate
HeapDestroy
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetStdHandle
FlsGetValue
FlsFree
FlsAlloc
Sleep
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetOEMCP
GetCPInfo
CreateFileA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
WritePrivateProfileStringA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
CloseHandle
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GetProcAddress
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
MulDiv
GetModuleHandleA
ExitProcess
VirtualAlloc
GetLastError
lstrlenA
WideCharToMultiByte
CompareStringA
MultiByteToWideChar
GetVersion
GetFileType
user32
DestroyMenu
GetForegroundWindow
GetTopWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
GetSysColorBrush
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EndPaint
BeginPaint
ReleaseDC
GetDC
EnableWindow
PostMessageA
LoadImageA
SetWindowRgn
GetSystemMetrics
PostQuitMessage
SendMessageA
SetTimer
LoadIconA
UnregisterClassA
IsIconic
LoadCursorA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
gdi32
SetTextColor
SetBkColor
SaveDC
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
GetClipBox
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
CreateBitmap
GetDeviceCaps
GetObjectA
CreateRectRgn
GetPixel
CombineRgn
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
SetViewportExtEx
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
shlwapi
PathFindExtensionA
ole32
CoLoadLibrary
oleaut32
VariantInit
VariantChangeType
VariantClear
crypt32
CryptStringToBinaryA
Exports
Exports
Sections
.text Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ