SetHook
Static task
static1
Behavioral task
behavioral1
Sample
e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f.dll
Resource
win10v2004-20231023-en
General
-
Target
e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f
-
Size
262KB
-
MD5
9492bade46fdedbb8a6263ba6f81964e
-
SHA1
b551b83106076babcd9c0111c1d705192cdd61e1
-
SHA256
e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f
-
SHA512
fcb38166774b21ed378ac9406e732702a1c58043910d1fe70d39d86511cdd3fae665904443200c9a548dc0a55098d363ad756df52f596179630162594f1ae9d6
-
SSDEEP
3072:HxUZzMiMcUw/e4d8IDhUo0+8nfu4Jy6kmmYgqqqXA1gTdXrozO15OhGjGEjS:A2cj/dec8fu4JBmYg6XA1gTWCiGjw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f
Files
-
e513baca17ede0a573af173cfc08d456ac15950a4cbf6a80515d28566a59a97f.dll windows:5 windows x64 arch:x64
108e62f82fe814b46f65243afd91ab78
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlLookupFunctionEntry
RtlUnwindEx
FlsSetValue
GetCommandLineA
HeapAlloc
HeapFree
Sleep
RaiseException
RtlPcToFileHeader
HeapReAlloc
HeapSize
HeapQueryInformation
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalFlags
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSetInformation
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
WritePrivateProfileStringA
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleFileNameW
FormatMessageA
LocalFree
lstrlenA
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
GetVersionExA
GlobalUnlock
GlobalFree
GlobalAddAtomA
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
WideCharToMultiByte
CompareStringA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
LoadLibraryExA
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WriteFile
SuspendThread
GetThreadContext
SetThreadContext
GetCurrentThreadId
VirtualFree
VirtualAlloc
GetCurrentProcess
FlushInstructionCache
VirtualProtect
VirtualQuery
ExitProcess
SetLastError
TerminateProcess
ResumeThread
GetCurrentThread
GetModuleFileNameA
SetFilePointer
OpenProcess
GetCurrentProcessId
GetModuleHandleA
GetProcAddress
CreateFileA
GetLastError
OutputDebugStringA
DeviceIoControl
IsDebuggerPresent
CloseHandle
user32
LoadCursorA
GetSysColorBrush
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
ShowWindow
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
CallNextHookEx
GetClassNameA
EnumWindows
CloseClipboard
SystemParametersInfoA
GetWindowPlacement
GetWindow
DestroyWindow
IsWindow
GetDlgItem
DestroyMenu
EmptyClipboard
OpenClipboard
GetWindowThreadProcessId
GetActiveWindow
UnhookWindowsHookEx
SetWindowsHookExA
EnableWindow
IsIconic
IsWindowVisible
ReleaseDC
WindowFromDC
WindowFromPoint
GetCursorPos
PostMessageA
GetWindowLongA
GetWindowRect
GetTopWindow
GetSystemMetrics
PostQuitMessage
CheckMenuItem
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
gdi32
GetStockObject
SelectObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
psapi
EnumProcessModules
GetModuleBaseNameA
Exports
Exports
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.share Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ