Static task
static1
Behavioral task
behavioral1
Sample
6411f1d23b59f8cafc804e57f222c1a5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6411f1d23b59f8cafc804e57f222c1a5.dll
Resource
win10v2004-20231222-en
General
-
Target
6411f1d23b59f8cafc804e57f222c1a5
-
Size
28KB
-
MD5
6411f1d23b59f8cafc804e57f222c1a5
-
SHA1
7f73ce09c38ffd5e65dbbd0f94a7fce2b44343f4
-
SHA256
7d3c5d4fd375e1c25f97c9bde65393b8ab2f8b88880af0e948795392faf6613d
-
SHA512
c1393e2fe57fc203eeea3175197b78f01bab511949cdf50157b32182bea62e34b35ddb5b40481f2eeba183eb7e44c0e385a51e860993e207ce3763afb447967a
-
SSDEEP
768:EMySn/ESvttGWF/KkdqrL+BBBQARQkESV8:IS/FbKfriBBQARs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6411f1d23b59f8cafc804e57f222c1a5
Files
-
6411f1d23b59f8cafc804e57f222c1a5.dll windows:4 windows x86 arch:x86
555badb1e88795941f57ad08dae1a15a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
strstr
_strupr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
gethostname
closesocket
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WritePrivateProfileStringA
IsBadReadPtr
ExitProcess
lstrcmpA
TerminateThread
Sleep
GetPrivateProfileStringA
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
VirtualProtectEx
CreateThread
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
WaitForSingleObject
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ