SetAPIHook
Static task
static1
Behavioral task
behavioral1
Sample
4290469873a171962f638fc86bd57e7b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4290469873a171962f638fc86bd57e7b.dll
Resource
win10v2004-20231215-en
General
-
Target
4290469873a171962f638fc86bd57e7b
-
Size
60KB
-
MD5
4290469873a171962f638fc86bd57e7b
-
SHA1
400fed31afc3404761d67344b334324bc0c74d8e
-
SHA256
e982ba1149a5eabb016292a2fa9e192b9e2d0811841c54b336bfa7c2072a7643
-
SHA512
f8204b849f9538a2cd65d48731634b6b4898a9104d365a60055bd23ba88f6ef881c190f4804c7e79f78401281b86237d40aed2663adcf9dbcbc7353e12429686
-
SSDEEP
768:3WgHwUJditF3YIXYn1QSrZJi0tzgZHjrtVA3f4zk3RM2tGI+TUaB70:mgHwU7itF3XXU1tzy5VCwz8RHGpbB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4290469873a171962f638fc86bd57e7b
Files
-
4290469873a171962f638fc86bd57e7b.dll windows:4 windows x86 arch:x86
95587b8599660b3e29ce77948ff9539e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
timeGetTime
kernel32
WriteProcessMemory
GetCurrentProcess
GetCurrentProcessId
FlushInstructionCache
ReadProcessMemory
VirtualProtect
VirtualQuery
GetProcAddress
FlushFileBuffers
CloseHandle
CreateFileA
HeapSize
WriteConsoleW
GetConsoleOutputCP
GetModuleHandleA
GetModuleFileNameA
WriteConsoleA
SetStdHandle
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
LoadLibraryA
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
SetWindowsHookExA
CallNextHookEx
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
iphlpapi
GetAdaptersInfo
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ