DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fe89303ae381af0bbbe872d2f127bf8d1a7e931abd37da4e41bd873b842173e5.dll
Resource
win7-20240903-en
General
-
Target
fe89303ae381af0bbbe872d2f127bf8d1a7e931abd37da4e41bd873b842173e5
-
Size
745KB
-
MD5
c7e06f43e2035a51bb6c1a590ca03f66
-
SHA1
3b62534b90bd60f38b861cdf2806812b4a6d625d
-
SHA256
fe89303ae381af0bbbe872d2f127bf8d1a7e931abd37da4e41bd873b842173e5
-
SHA512
c1b9144dfad8c322ed1f47e3d26176792e3ab9b3f475cf8e46782151841a3ec502241d805221430dbb508c8c794321031bf65d7a7395bb40022d4e780179755f
-
SSDEEP
6144:i5htEuwPCwdooxhXLY/3tvDc2YLV9yWoPTvtQPZOBk8DvUyGj/eoyOyqTJDrRtFw:EaCwpDXstOby/ZQPrmGbWEJDDFY1cA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fe89303ae381af0bbbe872d2f127bf8d1a7e931abd37da4e41bd873b842173e5
Files
-
fe89303ae381af0bbbe872d2f127bf8d1a7e931abd37da4e41bd873b842173e5.dll regsvr32 windows:4 windows x64 arch:x64
bd670eb847cf4465f552bc5226682890
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
crypt32
CryptStringToBinaryA
kernel32
GetFileAttributesA
HeapAlloc
HeapFree
RtlLookupFunctionEntry
RtlUnwindEx
HeapReAlloc
RaiseException
RtlPcToFileHeader
CreateDirectoryA
FlsSetValue
GetCommandLineA
GetProcessHeap
ExitProcess
HeapSize
GetStdHandle
HeapSetInformation
HeapCreate
HeapDestroy
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
FlsGetValue
FlsFree
FlsAlloc
RtlVirtualUnwind
Sleep
GetACP
SetStdHandle
GetFileType
SetHandleCount
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetVersion
QueryPerformanceFrequency
QueryPerformanceCounter
CompareStringA
lstrlenA
GlobalAddAtomA
DeleteAtom
lstrcpyA
VirtualAlloc
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
lstrcpynA
LocalFree
GetCurrentProcess
GetCurrentThread
FormatMessageA
GetLocalTime
SetLastError
MulDiv
SizeofResource
LockResource
CreateFileA
GetThreadLocale
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
WritePrivateProfileStringA
GetCurrentProcessId
CloseHandle
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
LoadResource
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FindResourceA
LCMapStringA
user32
IsZoomed
SetRect
SetTimer
WindowFromPoint
SetParent
GetSysColorBrush
GetMenuItemInfoA
UnregisterClassA
GetDCEx
LockWindowUpdate
ShowOwnedPopups
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetClassLongPtrA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
UnpackDDElParam
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetSysColor
GetWindowDC
ClientToScreen
FillRect
KillTimer
BeginPaint
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBoxA
wsprintfA
EndPaint
GetSystemMetrics
CopyRect
ReuseDDElParam
LoadMenuA
DestroyMenu
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
DispatchMessageA
GetWindowThreadProcessId
EnableWindow
LoadCursorA
InflateRect
InvalidateRect
UpdateWindow
SendMessageA
DestroyIcon
LoadImageA
RemovePropA
SetWindowLongA
CallWindowProcA
GetPropA
ReleaseDC
DrawFocusRect
GetDC
LoadStringA
LoadIconA
GetDlgItem
GetWindowLongA
SetPropA
GetClientRect
ReleaseCapture
SetCapture
SetCursor
GetParent
GetWindowRect
ScreenToClient
UnhookWindowsHookEx
gdi32
GetCurrentObject
SelectObject
SelectClipRgn
OffsetClipRgn
SetMapMode
SetWindowExtEx
SetViewportExtEx
SetViewportOrgEx
SetWindowOrgEx
SetBkColor
ExtTextOutA
MoveToEx
LineTo
GetClipBox
PtVisible
RectVisible
TextOutA
Escape
DeleteObject
SetTextColor
CreateFontIndirectA
GetObjectA
GetObjectType
DeleteDC
GetStockObject
GetDeviceCaps
SaveDC
RestoreDC
SetBkMode
BitBlt
IntersectClipRect
GetPixel
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
CreatePatternBrush
CreateBitmap
CreateSolidBrush
CreateRectRgnIndirect
SetRectRgn
PatBlt
GetTextMetricsA
GetTextExtentPoint32A
Ellipse
LPtoDP
DPtoLP
GetWindowExtEx
GetViewportExtEx
GetMapMode
GetBkColor
CreateCompatibleDC
CombineRgn
CreateEllipticRgn
CreateRectRgn
CreateCompatibleBitmap
ExcludeClipRect
CreatePen
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shell32
DragFinish
DragQueryFileA
ShellExecuteExA
shlwapi
PathFindExtensionA
ole32
CoLoadLibrary
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 342KB - Virtual size: 342KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ