Static task
static1
Behavioral task
behavioral1
Sample
13fb7fe26a591703c69211f93e140edd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13fb7fe26a591703c69211f93e140edd.dll
Resource
win10v2004-20231222-en
General
-
Target
13fb7fe26a591703c69211f93e140edd
-
Size
87KB
-
MD5
13fb7fe26a591703c69211f93e140edd
-
SHA1
3367ced31a6c1b11ab1fa714827cf4db1f920988
-
SHA256
1373c64f7f79f3f08a2d067463ae4696465c29b39b8b46e01e0101a883703a0a
-
SHA512
8cc573cc913799551157778846d5d2c403c18148628b7480647145543f38e34d8d61554f899679ba301564c94255ebedefba11c063551fd782f62811791af115
-
SSDEEP
1536:5SQYNA8WpKFIIean6Our7wBwGib6X/hXYvqfizbfHRIrZ2IPL0:5tQxKCn6Oursib6v2vqf4zRMZ28Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13fb7fe26a591703c69211f93e140edd
Files
-
13fb7fe26a591703c69211f93e140edd.dll windows:4 windows x86 arch:x86
25724e12bddf5d83058b26b5e04ea860
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowScrollBar
SetMenuInfo
OemToCharW
MessageBeep
LoadImageA
LoadCursorA
LoadAcceleratorsW
GetMenu
GetFocus
GetDlgItem
EndDeferWindowPos
DrawCaption
CreateDesktopW
CreateAcceleratorTableA
CopyImage
CharUpperBuffA
CharUpperA
ChangeMenuA
kernel32
GetModuleHandleA
LocalAlloc
LoadLibraryA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetLocalTime
GetFileSize
lstrcpynA
lstrcmpiA
VirtualFree
TlsGetValue
TlsFree
TlsAlloc
SleepEx
SetEndOfFile
RtlUnwind
RaiseException
OpenFileMappingA
EnumResourceLanguagesA
FreeResource
GetDateFormatA
MapViewOfFile
oleaut32
OleLoadPicturePath
SafeArrayDestroy
SysReAllocString
VarBstrCat
OleIconToCursor
ClearCustData
Sections
.text Size: 17KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ