Static task
static1
Behavioral task
behavioral1
Sample
hook(2).dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hook(2).dll
Resource
win10v2004-20230220-en
General
-
Target
hook(2).dll
-
Size
3KB
-
MD5
6a6c1dad9b52057f815b9d4ca5e962cb
-
SHA1
c3ba84e7ac1641768219290825779e8a2009bb63
-
SHA256
2014ced97466e3f290d4dd785be7df12f37f4795cf32543145229b15a8d20857
-
SHA512
4e6dc64504da5a2985b6098af0ff755a0298649be23b9a4a60ad536d3bc570d9fb789bed0a6c8a945412dea25bde94a5da3a3900f745f09ec784cb85ba3c1ade
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hook(2).dll
Files
-
hook(2).dll.dll windows x86
0b69d5093becb476150c8c4a428dc314
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcAddress
GetModuleHandleA
lstrcmpiA
FindFirstFileA
FindNextFileA
WideCharToMultiByte
FindFirstFileW
FindNextFileW
msvcrt
_stricmp
sprintf
shlwapi
PathStripPathA
Sections
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 102B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ