Edge
Static task
static1
Behavioral task
behavioral1
Sample
2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662.dll
Resource
win10-20230915-en
General
-
Target
2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662
-
Size
70KB
-
MD5
2d544a42a3a073438330c81607df6ca7
-
SHA1
79656d030acd5b4d799f703e45336c18b4dc019e
-
SHA256
2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662
-
SHA512
221ba1525b9ec51f20cdb20326827624a96f0d03d58a63817e1e90f2ae1567bc69615d6d93ec3d834f642295cc15eb75bfab6de0ba89765453d6bd438aa579b1
-
SSDEEP
768:G407txg6CVX762AORxFGPRDEEOsx3n+79Namb3GluLrXCS32Na1NzBoFsxHv5rMx:Gd7TGAgFqoQn+mmTCuL7HNzBl55rw3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662
Files
-
2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662.dll windows:5 windows x86
070b5b44988eb91ceb5948a1cf23bcef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
Sleep
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
GetEnvironmentVariableA
CreateMutexA
OpenMutexA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCurrentThreadId
GetCommandLineA
HeapAlloc
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
user32
KillTimer
SetTimer
GetMessageA
MessageBoxA
GetDesktopWindow
PostQuitMessage
TranslateMessage
DispatchMessageA
shell32
ShellExecuteExA
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ