Static task
static1
Behavioral task
behavioral1
Sample
137b0b73b877cfcd4c295d887d808796.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
137b0b73b877cfcd4c295d887d808796.dll
Resource
win10v2004-20231215-en
General
-
Target
137b0b73b877cfcd4c295d887d808796
-
Size
28KB
-
MD5
137b0b73b877cfcd4c295d887d808796
-
SHA1
0ea2c512ca23354a51c9dd6f5a7ce67fd65d834c
-
SHA256
7bf0d7993b147baaa6cc0f6e492ac46310e701a567683d0da8dd3d3fae3f0506
-
SHA512
59169ad8285f04c0971e36bccab090630ac110bacda2205fd204ed25a1777bc8ff654a491965ac148dfe462005102b2d6704fcb417c9b3c1bd43ffc07a00276d
-
SSDEEP
384:RZHfPpgXVHANyJC1hmrLpPtc9pJg0vJ5GIL1W:DRgFHANnmrL5tc9pLJkIU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 137b0b73b877cfcd4c295d887d808796
Files
-
137b0b73b877cfcd4c295d887d808796.dll windows:4 windows x86 arch:x86
4d9a44f3fcaafb1a5dfe4d85ae5d17ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
strcat
strlen
atoi
memcpy
strstr
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
_strlwr
kernel32
GetCurrentProcessId
TerminateProcess
lstrcpyA
CreateThread
GetModuleHandleA
Sleep
LoadLibraryA
GetTempPathA
CopyFileA
GetProcAddress
GetModuleFileNameA
lstrlenA
lstrcatA
GetCurrentProcess
WriteProcessMemory
ReadProcessMemory
VirtualProtectEx
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ