DSM_Entry
Static task
static1
Behavioral task
behavioral1
Sample
96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133.dll
Resource
win10v2004-20231215-en
General
-
Target
96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133
-
Size
64KB
-
MD5
56427bef7c60863f7666ee5bc64e7b0e
-
SHA1
f522704a79ec1dab9cacc7df7a6228f7b1d8a057
-
SHA256
96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133
-
SHA512
cc8b7754d07a066c8e915d2ff9caadfc8a291e35f550bde2ba9ad05d70a162047f95d141262d08133ef06b9e455974f3c2daa86c192af77a6519a0d4a8fa77cc
-
SSDEEP
384:ILFWwezQcOV9l+4JGfswi5HEG+r4aPOjLfpjjZMqUO7sfRfYdVwL+nQax5Eyiwu1:ILFWqc09U4JGpckHfPOnULqAI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133
Files
-
96af546089e9971a879a0425656deb30a756902fbd833431cdb80c7f2dc29133.dll windows:4 windows x64 arch:x64
7b79a00938f6880a95015c2d061f361f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
IsBadStringPtrW
LoadLibraryW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
_wcsdup
free
fwrite
getenv
memcmp
memcpy
memmove
realloc
strchr
strcmp
strcpy
strcspn
strlen
user32
DialogBoxParamW
EnableWindow
EndDialog
GetDlgItem
GetWindowLongPtrW
IsWindow
PeekMessageW
PostMessageW
RegisterWindowMessageA
SendMessageA
SendMessageW
SetWindowLongPtrW
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 416B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ