Static task
static1
Behavioral task
behavioral1
Sample
challange_Benign_ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
challange_Benign_ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33.dll
Resource
win10v2004-20230703-en
General
-
Target
challange_Benign_ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33.dll
-
Size
10KB
-
MD5
9c7fb97adcf8f49d4ca5b0cd655796e7
-
SHA1
eea487604f549bc1bcb1e859dd4ee3223c179fba
-
SHA256
ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33
-
SHA512
88896022cebd7432e26c335b23484c08554ea2d1f290178bb90b4b2aae34d078b8d44d61a80d49a7398b9fa2f3c0f448676c05a65178b812f8086ee4b68a90c4
-
SSDEEP
192:bqPzB9Idx8BTCnGbnS3/ZOtqgjrLRoN21cHvo6U:+PzvfTc+SPZOtqgjCN2uHvo7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource challange_Benign_ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33.dll
Files
-
challange_Benign_ff240441afa963128fb48c5da901a677e8a3a60bf2a711cb9b858d59a15b1a33.dll.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
w9LOUDhT Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ADEOpDXB Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
kGipeFt6 Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SMiv7vrQ Size: 265B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5wxZqLTW Size: 74B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
NyOKvXjj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
MzK3JvZq Size: 24B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ