___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
4f2e8069422710590d74b853f0cd6094.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f2e8069422710590d74b853f0cd6094.dll
Resource
win10v2004-20231215-en
General
-
Target
4f2e8069422710590d74b853f0cd6094
-
Size
119KB
-
MD5
4f2e8069422710590d74b853f0cd6094
-
SHA1
bb0a3380acc49eeaea519e33e98c827200aebdfe
-
SHA256
dc7d33383feda7c34746d6f050676599eb606809aa3f0a64f715f4fc9136d0ba
-
SHA512
20157a9cbaaea90bb3c1db614ab3e0df89812aac9f5536bf23cbe34f85f2784dcee6b119a1b17de0e84e29a5decd3c2cec59b535845bfd6e98f466cf3b4a092d
-
SSDEEP
3072:PpAVDNxrMYdKtiny+GAuYYhs6v4PDWMeT8H3NcQPrufX:yjxr3MtgvGANB6v4DWuOQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f2e8069422710590d74b853f0cd6094
Files
-
4f2e8069422710590d74b853f0cd6094.dll windows:4 windows x86 arch:x86
6a94224414c47b0e9a1ea0f89a09568c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateFileA
DeleteFileA
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
user32
EnumThreadWindows
MessageBoxA
wsprintfA
Exports
Exports
Sections
.text Size: 85KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ