DSM_Entry
Static task
static1
Behavioral task
behavioral1
Sample
91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c.dll
Resource
win10v2004-20230915-en
General
-
Target
91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c
-
Size
64KB
-
MD5
9183379d6a1de8e4cc1b4a6a81cf8c48
-
SHA1
6c411c679ca2693f1b64d2bc716824010ab3084f
-
SHA256
91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c
-
SHA512
64307e0db2a45f1a7c5dc1cade4d3b1dc055a802a074bf56d16849b31b64f13b1b6bc0d73aeaebfba12381acff9d93eb4329683102092e927cb01f893ad5638b
-
SSDEEP
384:IofqeGjA+t1si4496/MPpTsWcqyOmyMGtQTOyjNf97vXgXV5CeUaZsfRfYdVwL+r:Iofz+t1si0MxTsWcqPZJy/wz6qA6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c
Files
-
91bd777dcf228c69d475d815847eee8b9038d892c315d6fa09304973d204850c.dll windows:4 windows x64
e0560c2cd60459b51f2a3d742d16026c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
FreeLibrary
GetModuleHandleW
GetProcAddress
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
IsBadStringPtrW
LoadLibraryW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
_wcsdup
free
fwrite
getenv
memcmp
memcpy
memmove
realloc
strchr
strcmp
strcpy
strcspn
strlen
user32
DialogBoxParamW
EnableWindow
EndDialog
GetDlgItem
GetWindowLongPtrW
IsWindow
PeekMessageW
PostMessageW
RegisterWindowMessageA
SendMessageA
SendMessageW
SetWindowLongPtrW
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 416B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ