DSM_Entry
Static task
static1
Behavioral task
behavioral1
Sample
ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69.dll
Resource
win10v2004-20231023-en
General
-
Target
ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69
-
Size
64KB
-
MD5
70703a9a7c3da22befe9b4e178dfd8f4
-
SHA1
bf4139a86c01e84d6a82b43b8115628302cbb228
-
SHA256
ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69
-
SHA512
f6d78600adccb8c86ce09c38baa5f9b1bf0df23fc92f7e6446114e66ae0806ddbdfe545cd475c2c88bd8900299df50da55ebdab7119c1ccc0aef75b552c774c9
-
SSDEEP
384:IQFWwezQcOV9l+4JGfswi5HEG+r4aPOjLfpXSYZMqUO7sfRfYdVwL+nQax5Eyiwc:IQFWqc09U4JGpckHfPOrULqAI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69
Files
-
ea81bfcb5d794fbb37a7d64ef18cf08cec93c69dbe9e60123a5d12f0a9240c69.dll windows:4 windows x64
7b79a00938f6880a95015c2d061f361f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
IsBadStringPtrW
LoadLibraryW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
_wcsdup
free
fwrite
getenv
memcmp
memcpy
memmove
realloc
strchr
strcmp
strcpy
strcspn
strlen
user32
DialogBoxParamW
EnableWindow
EndDialog
GetDlgItem
GetWindowLongPtrW
IsWindow
PeekMessageW
PostMessageW
RegisterWindowMessageA
SendMessageA
SendMessageW
SetWindowLongPtrW
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 416B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ