?_CreateCaret@@YGPAX_KDI@Z
Static task
static1
Behavioral task
behavioral1
Sample
20be6422acc10f74924388022f5ab9a7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20be6422acc10f74924388022f5ab9a7.dll
Resource
win10v2004-20231215-en
General
-
Target
20be6422acc10f74924388022f5ab9a7
-
Size
147KB
-
MD5
20be6422acc10f74924388022f5ab9a7
-
SHA1
ce71404f096863839dab25fdce29e44dd8a1e3ad
-
SHA256
e72838d1c2941cfcb3c01d80768d130909ba05c12ff15739840c0eed56181fa3
-
SHA512
a5ce045a2d04a49938bbb8edd365d4206bb42e724603f832554a00a9fab7b7a1b5ef3eafc05266e5e644d02b264b0ff4a0f7a5a4f3a1da660a90634dd3f1bd5c
-
SSDEEP
3072:VzmiPdhHmMmoruk0AJhCmuDrmNa80pPq5AcuEHmi:Vi2dhHmMmor1Jh/wYa8SyFuEH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20be6422acc10f74924388022f5ab9a7
Files
-
20be6422acc10f74924388022f5ab9a7.dll windows:5 windows x86 arch:x86
dd6367397f88de5fcd2dcf43dea4918d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
StrCmpNIA
PathCanonicalizeA
StrRChrA
ord158
ChrCmpIW
PathFindFileNameW
kernel32
FileTimeToDosDateTime
OpenJobObjectA
GetDllDirectoryW
GlobalFlags
FlushFileBuffers
GetHandleInformation
CreateFileMappingA
TransmitCommChar
GlobalGetAtomNameW
GetCommMask
OpenFileMappingW
lstrcpyA
CopyFileA
GetCommConfig
CreateMailslotA
lstrcatW
LoadLibraryExW
CreateWaitableTimerW
OpenEventA
CreateTapePartition
user32
CallNextHookEx
AttachThreadInput
ChangeMenuA
DefDlgProcW
OpenDesktopA
EnumDisplaySettingsA
SetScrollRange
GetDoubleClickTime
GetMonitorInfoA
SetPropW
GetKeyboardLayoutNameW
SetWindowContextHelpId
GetMenuStringA
CreatePopupMenu
IsDlgButtonChecked
SetWindowTextW
DestroyIcon
SendMessageCallbackA
LoadBitmapA
SetCaretPos
gdi32
Polyline
GetEnhMetaFilePaletteEntries
GetPath
CreateDiscardableBitmap
SetTextAlign
ExtSelectClipRgn
GetTextAlign
GetPaletteEntries
CreateMetaFileA
GetCurrentObject
FixBrushOrgEx
CreateEnhMetaFileW
advapi32
InitializeSecurityDescriptor
Exports
Exports
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MData Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ICode Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.MConst Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NData Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 838B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ