Static task
static1
Behavioral task
behavioral1
Sample
053b581fd35a844d86c8cdcf2291ffb9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
053b581fd35a844d86c8cdcf2291ffb9.dll
Resource
win10v2004-20231215-en
General
-
Target
053b581fd35a844d86c8cdcf2291ffb9
-
Size
18KB
-
MD5
053b581fd35a844d86c8cdcf2291ffb9
-
SHA1
396505a850f1bb0184e11021899d88f8e5ab79f4
-
SHA256
b37f488d2700218832c7b15b6e770991763a81ddcefbbffbfbcabbf9621b28ff
-
SHA512
0821d2c00c82ba96e8f16ef817d216e27e04246b4d7bc5f5602ef82e92848b3e8f13753c6488a44eb91b0a08ab218698fa60cbfaeac5d78695a8d6970b46274d
-
SSDEEP
384:g+UDpoGSJbWXb4OvDtylzXQvYNr8Atb7EdY+uI26yPs:fUD6GRr4O9Y98A9s+I26y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 053b581fd35a844d86c8cdcf2291ffb9
Files
-
053b581fd35a844d86c8cdcf2291ffb9.dll windows:4 windows x86 arch:x86
58b38609bbcc7cd1657e873050f2a03a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
Sleep
CreateThread
CloseHandle
ReadFile
CreateFileA
CreateEventA
OpenEventA
GetCommandLineA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
GetCurrentProcess
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
WriteFile
GetFileSize
VirtualProtectEx
SetThreadPriority
GlobalUnlock
VirtualAlloc
VirtualFree
ReadProcessMemory
GlobalAlloc
GlobalLock
GlobalFree
VirtualAllocEx
IsBadReadPtr
user32
UnhookWindowsHookEx
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetInputState
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ