Static task
static1
Behavioral task
behavioral1
Sample
4b516493a98112d910915396874d690b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b516493a98112d910915396874d690b.dll
Resource
win10v2004-20231215-en
General
-
Target
4b516493a98112d910915396874d690b
-
Size
30KB
-
MD5
4b516493a98112d910915396874d690b
-
SHA1
498ee3d51129ce9ebb390699f8e872bf04aa11cd
-
SHA256
8e4027a362d01b052c919ccf0d53b2997ea35f7297726722324bdf3654fd8f64
-
SHA512
8c094d40c9e0dfcee758619b2c4c1d39011b4ad32289363185f9139da695ea77f30ae6f34d7e0f29139be36e8272dd21b598e2e36ad3b67099eb0be6b3a673e4
-
SSDEEP
384:LyfXYGPKLvM1TunFXg666HmH14wawlp5dv7zoahf5/3B4z9MPTKCR9LuBBQARQk0:LyfXYGCd4VLVl/wC2BBQARQkVX7Ve
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b516493a98112d910915396874d690b
Files
-
4b516493a98112d910915396874d690b.dll windows:4 windows x86 arch:x86
d96b43c56d8e0fab8cd69126339b5b8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
sscanf
strstr
RtlDeleteElementGenericTable
RtlNumberGenericTableElements
RtlGetElementGenericTable
RtlInitializeGenericTable
RtlInsertElementGenericTable
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
IsBadReadPtr
CreateFileMappingA
GetPrivateProfileStringA
lstrcmpA
TerminateThread
Sleep
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
GlobalAlloc
GlobalFree
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
LoadLibraryA
MoveFileExA
ReadFile
lstrcatA
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ