Fosklcks
Static task
static1
Behavioral task
behavioral1
Sample
0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c.dll
Resource
win10v2004-20230703-en
General
-
Target
588cb1a8e7a30760b06e0d17e1d530da.bin
-
Size
25KB
-
MD5
1bde646a677c26ad353a75a21cccd806
-
SHA1
9155e1192b30f214790fa44a008f82700e0e0ecf
-
SHA256
241206d14d10befa961196a28124824f5bffecd2df7fcbfbcfd2280f646cca76
-
SHA512
3888d17c6531633334040714d4ef7b3b970368213a37177025e77122af55f1344b7f1f8a1425ad537108b9515723120a6f44d8cce7c02f1feef440e8f4b6d055
-
SSDEEP
384:1Qwryn1EAM9NMGUYrolcZlxlgNVRtqxsaNzYiZ0cpbyJIqCc91Ro14E30B0aI+t:1CEVjMagcZM/1aJYi7twIqtrEr+t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c.dll
Files
-
588cb1a8e7a30760b06e0d17e1d530da.bin.zip
Password: infected
-
0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c.dll.dll windows x86
Password: infected
e16bd71cc52f8b2347f0367958a2caa0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
WriteConsoleW
GetProcAddress
GetModuleHandleW
SetFilePointerEx
VirtualFree
SetStdHandle
GetConsoleMode
VirtualAlloc
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
LoadLibraryW
OutputDebugStringW
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryExW
GetModuleFileNameW
WriteFile
IsProcessorFeaturePresent
IsDebuggerPresent
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
Sleep
TerminateProcess
GetCurrentProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetCommandLineA
GetCurrentThreadId
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetProcessHeap
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
CreateFileW
loadperf
LoadPerfCounterTextStringsW
avifil32
AVIStreamEndStreaming
AVIFileEndRecord
AVISaveV
msvfw32
DrawDibBegin
DrawDibDraw
DrawDibChangePalette
urlmon
CoInternetGetSession
FindMimeFromData
BindAsyncMoniker
ObtainUserAgentString
oleaut32
VarUI1FromUI4
VarDecFromUI1
VarBoolFromDate
LPSAFEARRAY_Marshal
VarI2FromBool
DispGetIDsOfNames
VarCyFromI4
VarDateFromStr
wininet
HttpSendRequestW
FtpFindFirstFileA
FindFirstUrlCacheEntryW
InternetGetCookieW
InternetReadFile
InternetSetOptionExA
InternetDial
mswsock
EnumProtocolsW
AcceptEx
GetServiceW
GetTypeByNameW
GetAddressByNameA
SetServiceW
rcmd
s_perror
rexec
GetTypeByNameA
odbc32
ord166
ord86
ord22
ord32
ord13
ord53
ord28
ord62
wsnmp32
ord201
ord204
ord502
ord220
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ