Static task
static1
Behavioral task
behavioral1
Sample
01e242ba83f45b19c87de2338c61e07c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01e242ba83f45b19c87de2338c61e07c.dll
Resource
win10v2004-20231215-en
General
-
Target
01e242ba83f45b19c87de2338c61e07c
-
Size
32KB
-
MD5
01e242ba83f45b19c87de2338c61e07c
-
SHA1
6f99e75f065d98bf56b1ab2b9c7de6b20d6068a3
-
SHA256
cb897d4b39571514ec5614e27abd71271807b85deaed29611d6018990ea6f09c
-
SHA512
46e11ea0972200ef9afa804ac5ee61d9770badccf107a0227c1ec112f73a5cd03fe34dd87fdefbd728d4466feaa75353226e35a3cc67a404bec229fe89cec439
-
SSDEEP
768:/WRnrWybDPLvLtNUEageSLVZ3ZH/aUe1K2kvcnRtgk9SsV:/knrWybDPLvUoNVZ3ZH/aUiK2kvcnzVZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01e242ba83f45b19c87de2338c61e07c
Files
-
01e242ba83f45b19c87de2338c61e07c.dll windows:4 windows x86 arch:x86
dc48ddbc0c907798129d2009eb06d8f8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
kernel32
CloseHandle
CreateFileA
CreateThread
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTickCount
GetVersion
LoadLibraryA
MoveFileExA
ReadFile
SetFilePointer
SetFileTime
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
lstrcatA
user32
SendMessageA
wsprintfA
ws2_32
WSACleanup
WSAGetLastError
WSAStartup
closesocket
connect
gethostbyname
socket
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ