ReflectiveLoader
Static task
static1
Behavioral task
behavioral1
Sample
cve-2014-4113.x64.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cve-2014-4113.x64.dll
Resource
win10v2004-20231127-en
General
-
Target
cve-2014-4113.x64.dll.1
-
Size
83KB
-
MD5
c8c886ca25a381b22343a397f80a35c1
-
SHA1
da89157954c4fada4b7780e5d7e7e976df361df3
-
SHA256
e6f2b9e53c7e38b725dd5605fb1d6527128bfe0f9a17ef305505bdc7a0771a79
-
SHA512
149a87ca8b33b05b6de6d39598aba999d498ee0e8e9fad6e76c057a8a621a80cb56e55c4c29565f03b487395d0100303ded32dc8f40a78cea322d8422ffa959f
-
SSDEEP
1536:PNaHjtTCqnMTyfYJ30+XlG+k3GCBAP5vn+7rv78MzsW4duJdBft:IHBTJMTyQS+XlG+CvBAh2bcuJdh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cve-2014-4113.x64.dll.1
Files
-
cve-2014-4113.x64.dll.1.dll windows:5 windows x64 arch:x64
a363dd5cb1ea15e38505d7a2a1ab3054
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
LocalAlloc
GetCurrentProcess
GetCurrentProcessId
CreateThread
GetCurrentThreadId
LoadLibraryA
GetVersionExA
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
GetCommandLineA
IsDebuggerPresent
EncodePointer
DecodePointer
IsProcessorFeaturePresent
GetLastError
SetLastError
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
HeapFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WriteFile
GetModuleFileNameW
LoadLibraryExW
HeapAlloc
HeapReAlloc
GetStringTypeW
OutputDebugStringW
HeapSize
CreateFileW
user32
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHook
SetWindowLongPtrA
InsertMenuItemA
EndMenu
TrackPopupMenu
DestroyMenu
CreatePopupMenu
CreateWindowExA
RegisterClassA
DefWindowProcA
PostMessageA
Exports
Exports
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ