Rundll32
Static task
static1
Behavioral task
behavioral1
Sample
025d30ec1875510defb35706699db2fc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
025d30ec1875510defb35706699db2fc.dll
Resource
win10v2004-20231215-en
General
-
Target
025d30ec1875510defb35706699db2fc
-
Size
44KB
-
MD5
025d30ec1875510defb35706699db2fc
-
SHA1
ebdadbf85db72b28b41e1b6f90e6a28fa5f92a7c
-
SHA256
dcd7f2861bc42728ce18a0397717f4853f28a7cb1139c43ef2ad34a5c605dfef
-
SHA512
96c9025abb7a1121b28be31b18b63a06fecbe5f769da8e69e507570bdbe55c1dd75653d0b0ff70e86798bbc2f78e4ac392cde4579fca0f71a29c689c7a2f9f88
-
SSDEEP
768:Na1NbVHQfofbODyvt8YyoEkP1xl4gx3tOFiiDhhugJlqSxCc:UVH7bODyeYyoZ1xl4iAF17ugJlqSN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 025d30ec1875510defb35706699db2fc
Files
-
025d30ec1875510defb35706699db2fc.dll windows:4 windows x86 arch:x86
304e429c75842d290869224bb80ef773
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHGetValueA
SHSetValueA
SHDeleteValueA
kernel32
LoadResource
FindResourceA
GetVersionExA
GetProcAddress
GetModuleHandleA
lstrlenA
GetModuleFileNameA
MultiByteToWideChar
GetSystemDirectoryA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
GetACP
FreeLibrary
LoadLibraryA
GetShortPathNameA
GetLastError
CreateDirectoryA
GetEnvironmentVariableA
SizeofResource
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
MoveFileExA
DeleteFileA
CopyFileA
GetCurrentThreadId
IsBadReadPtr
CloseHandle
CreateMutexA
InitializeCriticalSection
WinExec
LeaveCriticalSection
EnterCriticalSection
LoadLibraryExA
SetErrorMode
WideCharToMultiByte
RemoveDirectoryA
LockResource
DeleteCriticalSection
user32
SetWindowLongA
PostMessageA
FindWindowExA
SendMessageA
wsprintfA
LoadIconA
LoadImageA
MessageBoxA
PostQuitMessage
EndDialog
CallWindowProcW
CallWindowProcA
SetWindowsHookExA
GetClassNameA
GetWindowModuleFileNameA
CallNextHookEx
IsWindow
UnhookWindowsHookEx
IsWindowUnicode
SetWindowLongW
GetFocus
GetDesktopWindow
CreateDialogParamA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
SetTimer
gdi32
CreateFontIndirectA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
ole32
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
StringFromIID
OleInitialize
OleUninitialize
oleaut32
LoadTypeLi
RegisterTypeLi
comctl32
ord17
wininet
InternetGetConnectedState
msvcrt
__dllonexit
__CxxFrameHandler
strrchr
toupper
tolower
ftell
malloc
fread
free
rewind
fgets
_strnicmp
fseek
fprintf
_except_handler3
memcpy
strcmp
memmove
strcat
sscanf
isalnum
sprintf
strstr
strncpy
fopen
_initterm
_adjust_fdiv
strlen
memset
_onexit
fwrite
fclose
_snprintf
strcpy
_itoa
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cnshelp Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ