Static task
static1
Behavioral task
behavioral1
Sample
5ebe4e9a4be8afe5dcabc59722853393.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ebe4e9a4be8afe5dcabc59722853393.dll
Resource
win10v2004-20231215-en
General
-
Target
5ebe4e9a4be8afe5dcabc59722853393
-
Size
756KB
-
MD5
5ebe4e9a4be8afe5dcabc59722853393
-
SHA1
9783c973c9b6ae612841e93b2b9caf7262a09cf0
-
SHA256
5a8fbd7bdb51ee23de8fc133abe5ed999c19eb0ea667503659c3f193b69ad193
-
SHA512
8e8865eff33791de8fd3ef96a5c1d7978425c3002ba23d71ab1392d5c634f89c75bc6a3312202220951842f9b9f5fc1cb7852e037bbe19b415ba064cbc2f8b44
-
SSDEEP
192:2rRZlYr0y1TekTDoIJywcBQQO/M81J1LlDDSut2VkybCmpHkGEKe52beSXO:2rbKEFwcq/TfquMOybCSkGEKq4jO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ebe4e9a4be8afe5dcabc59722853393
Files
-
5ebe4e9a4be8afe5dcabc59722853393.dll windows:4 windows x86 arch:x86
6240ccfe56f55f678702faccc3197898
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
GetPrivateProfileStringA
GetCurrentProcessId
GetTickCount
IsBadReadPtr
ExitProcess
GetTempPathA
DeleteFileA
GetWindowsDirectoryA
SetFilePointer
WriteFile
HeapAlloc
GetProcessHeap
VirtualProtect
GetFileSize
GetProcAddress
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
GetCommandLineA
ReadFile
SetEvent
CloseHandle
GetModuleFileNameA
Sleep
GetCurrentProcess
TerminateProcess
OpenEventA
CreateEventA
CreateThread
user32
BroadcastSystemMessageA
SetWindowsHookExA
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
IsWindowVisible
GetWindowTextA
GetWindowLongA
FindWindowExA
wvsprintfA
wsprintfA
advapi32
RegQueryValueExA
RegSetValueA
RegCreateKeyA
RegOpenKeyA
RegCloseKey
RegSetValueExA
msvcrt
strstr
_strcmpi
_adjust_fdiv
_initterm
_strlwr
realloc
strcpy
strcat
strlen
free
strncpy
strchr
_strnicmp
memset
malloc
strrchr
sprintf
memcpy
_except_handler3
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ