Static task
static1
Behavioral task
behavioral1
Sample
46f34bf445de7a5e91969e3075a812d1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46f34bf445de7a5e91969e3075a812d1.dll
Resource
win10v2004-20231215-en
General
-
Target
46f34bf445de7a5e91969e3075a812d1
-
Size
125KB
-
MD5
46f34bf445de7a5e91969e3075a812d1
-
SHA1
714e82b4c86d72fa42072b3b3a4bc9cc4ccb6b5c
-
SHA256
eb0af26836c7be02df4e7dbead27b373947c889423d0331b87d2893d856238df
-
SHA512
ee7153fa385eda0cea1cf7216a200b68eca04722f12d995973a65d3032245497046d3a4082aa4780df69adcabb0d70cc7747b2443e13af8f05c307f4a9a8c5af
-
SSDEEP
3072:F4TXZ5ymOR+RccbMJXZ+zJYUVxpy8QaJbTm0otq:F+E+6KIXiJYe3bTm0otq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46f34bf445de7a5e91969e3075a812d1
Files
-
46f34bf445de7a5e91969e3075a812d1.dll windows:4 windows x86 arch:x86
e7b60b434abf847f073a5172df160546
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateThread
ExitThread
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
IsBadCodePtr
IsBadReadPtr
IsBadStringPtrA
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
LocalAlloc
MultiByteToWideChar
OpenProcess
OutputDebugStringA
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetHandleCount
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WideCharToMultiByte
WriteFile
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
user32
AppendMenuA
CallWindowProcA
CharLowerBuffA
CharUpperA
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateDialogParamA
CreatePopupMenu
DefDlgProcA
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EnumClipboardFormats
FindWindowA
GetActiveWindow
GetClassInfoA
GetClientRect
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemTextA
GetMenu
GetMessageA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
IsMenu
IsWindow
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
OpenClipboard
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UnregisterClassA
wsprintfA
wvsprintfA
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 108KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ