Static task
static1
Behavioral task
behavioral1
Sample
3e709f77d886cbb14c911b0f7b2676ad.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e709f77d886cbb14c911b0f7b2676ad.dll
Resource
win10v2004-20231215-en
General
-
Target
3e709f77d886cbb14c911b0f7b2676ad
-
Size
30KB
-
MD5
3e709f77d886cbb14c911b0f7b2676ad
-
SHA1
728a8ae5b14bca73118ea1f7d09011d18d814ade
-
SHA256
6721b18ba86c90fed5e1fcfe3cb74c31c557ab6e0975dd73a0639f3d1f6b8afb
-
SHA512
c2f2f9a77734a018f3a4102536923cefa7cec9b97644b62c22419a61c93359a89653e52bf31d30ffd06cf9a62fba971d4a6294f57cf11b8847e9a065d1acc269
-
SSDEEP
384:LyfXYGPKLvM1TunFXg666HmH14wawlp5dv7zoahf5/3B4z9MPTKCR9LuBBQARQko:LyfXYGCd4VLVl/wC2BBQARQkVX7Ve
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e709f77d886cbb14c911b0f7b2676ad
Files
-
3e709f77d886cbb14c911b0f7b2676ad.dll windows:4 windows x86 arch:x86
d96b43c56d8e0fab8cd69126339b5b8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
sscanf
strstr
RtlDeleteElementGenericTable
RtlNumberGenericTableElements
RtlGetElementGenericTable
RtlInitializeGenericTable
RtlInsertElementGenericTable
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
IsBadReadPtr
CreateFileMappingA
GetPrivateProfileStringA
lstrcmpA
TerminateThread
Sleep
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
GlobalAlloc
GlobalFree
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
LoadLibraryA
MoveFileExA
ReadFile
lstrcatA
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ