Static task
static1
Behavioral task
behavioral1
Sample
e3d82b40f54284ee00edf7141edfce84.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e3d82b40f54284ee00edf7141edfce84.dll
Resource
win10v2004-20231215-en
General
-
Target
e3d82b40f54284ee00edf7141edfce84
-
Size
152KB
-
MD5
e3d82b40f54284ee00edf7141edfce84
-
SHA1
4d36e9b6e37b16a65350a8de319e543f0bf7f99d
-
SHA256
7ec5a6de0f96ef2ca58e0634ee8889a938329cee39ed4ffecc15ccf8d6fe9e5e
-
SHA512
2e727913f7af7e264209204d5bf2ef1c809f02e61dcb8b5dd0884e407fb2e5099d1ef4812b14fceaf8a2a0faeb1112622043f62be99a7da1f0d7198ca3a23f33
-
SSDEEP
3072:spSjJDAPTLMYwTQIRurdQdi9trmjLygGyH21qFo9eN:+mUWxR6mdiTrmnyBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3d82b40f54284ee00edf7141edfce84
Files
-
e3d82b40f54284ee00edf7141edfce84.dll windows:4 windows x86 arch:x86
6614a160b0407dbe994985cf6b1a8e29
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
IsBadReadPtr
FlushInstructionCache
GetCurrentThread
VirtualProtect
FreeLibrary
SetThreadPriority
GetCurrentThreadId
GetProcessVersion
CloseHandle
WaitForSingleObject
GetFileSize
FindFirstFileA
GetModuleFileNameA
GetThreadPriority
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSection
GetLastError
GetExitCodeProcess
OpenProcess
ResetEvent
SetEvent
WaitForMultipleObjects
CreateEventA
HeapFree
GetProcessHeap
CreateThread
HeapAlloc
FindClose
FindNextFileA
MultiByteToWideChar
GetModuleHandleA
GetFileTime
CreateFileA
HeapReAlloc
HeapValidate
IsBadWritePtr
lstrlenW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
VirtualAlloc
LoadLibraryA
GetProcAddress
lstrlenA
GetCurrentProcess
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetStdHandle
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
Sleep
FlushFileBuffers
RaiseException
InterlockedDecrement
InterlockedIncrement
MoveFileA
GetCommandLineA
GetVersion
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
WideCharToMultiByte
ExitProcess
user32
SetActiveWindow
GetCursor
GetForegroundWindow
GetKeyboardLayout
MapVirtualKeyExA
DispatchMessageA
TranslateMessage
SetLastErrorEx
SetWindowLongA
SetRectEmpty
SetCursorPos
IsRectEmpty
SetThreadDesktop
GetWindowDC
GetIconInfo
GetMessageA
SetForegroundWindow
SetTimer
FindWindowA
GetWindowRect
SetRect
GetDC
ScreenToClient
GetWindowThreadProcessId
SetParent
GetClientRect
gdi32
SetRectRgn
advapi32
RevertToSelf
oleaut32
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SYNC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ