HookFunction
Static task
static1
Behavioral task
behavioral1
Sample
01fdc9daa74fb522c3ab50243915f807.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01fdc9daa74fb522c3ab50243915f807.dll
Resource
win10v2004-20231215-en
General
-
Target
01fdc9daa74fb522c3ab50243915f807
-
Size
32KB
-
MD5
01fdc9daa74fb522c3ab50243915f807
-
SHA1
f6875e1707e03973e6ef3a1e3d21412c28a90e72
-
SHA256
f005518f55050c45beea6a106199bcd9c3cc1107ee31cedc76f9493b5fc18019
-
SHA512
436d5f98e65792510ab7095b2ad575c720e9851f8cf29993cbd68c75c880cd4b1bd05c7a419ad02ea6e7b0bf4e957df75c3591d7e942bc078de981b50192fe10
-
SSDEEP
384:Fj2Hs4BoCmlvQNTv5BrYT1zyRCSbAtuwyHG5o91sn:OPBNTv5NYZztSbAtCm5o9qn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01fdc9daa74fb522c3ab50243915f807
Files
-
01fdc9daa74fb522c3ab50243915f807.dll windows:4 windows x86 arch:x86
b374a4b22c35b62049b727017da4fa9e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
GetModuleHandleA
IsBadCodePtr
CloseHandle
Process32Next
Process32First
IsBadReadPtr
OpenProcess
WideCharToMultiByte
DisableThreadLibraryCalls
CreateToolhelp32Snapshot
VirtualProtect
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
InterlockedDecrement
InterlockedIncrement
user32
wsprintfA
advapi32
RegEnumValueW
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ