Static task
static1
Behavioral task
behavioral1
Sample
362816334841a1963e8647b10ef89456.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
362816334841a1963e8647b10ef89456.dll
Resource
win10v2004-20231215-en
General
-
Target
362816334841a1963e8647b10ef89456
-
Size
36KB
-
MD5
362816334841a1963e8647b10ef89456
-
SHA1
0b6dd4c62b8da559e78925ec8dcc7dc67f989243
-
SHA256
6a086894b14313e1f3f4efe2c5dc3a197e4350fe822f26081994e6c170854568
-
SHA512
ec4bfb9fcb403fd9c8284da96c31fbf2d53b4e7b7bf557ad2f6fdfe91cdee3124d3dee01192b9748f704a5391d43cc34cc899c3a0eaceb7cf03045b1df970931
-
SSDEEP
384:sx/8mN0CnRC3ZhQKl4Z4Q4A8VNhDFze3pWccACPprSokuBBQARQkbPFwA+z//:cESRWZhQK02BYFbCtJDBBQARQkTFwf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 362816334841a1963e8647b10ef89456
Files
-
362816334841a1963e8647b10ef89456.dll windows:4 windows x86 arch:x86
0d408d29ad29bbecacf0ed790fa04d26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
closesocket
gethostname
ntdll
strlen
memcpy
memcmp
strstr
RtlZeroMemory
RtlUnwind
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
MapViewOfFile
UnmapViewOfFile
GetExitCodeThread
IsBadReadPtr
CreateFileMappingA
lstrcpynA
GetCommandLineA
WriteFile
WideCharToMultiByte
VirtualProtectEx
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateFileA
CreateProcessA
DeleteFileA
VirtualFree
GetFileSize
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
MoveFileExA
ReadFile
VirtualAlloc
user32
wsprintfA
SetTimer
SendMessageA
RegisterWindowMessageA
FindWindowA
UnhookWindowsHookEx
CallNextHookEx
KillTimer
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
EnumWindows
advapi32
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 890B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ