Static task
static1
Behavioral task
behavioral1
Sample
06a77d4d67424baa348a7d4c6fcd1ffd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06a77d4d67424baa348a7d4c6fcd1ffd.dll
Resource
win10v2004-20231215-en
General
-
Target
06a77d4d67424baa348a7d4c6fcd1ffd
-
Size
23KB
-
MD5
06a77d4d67424baa348a7d4c6fcd1ffd
-
SHA1
62ab042441bf9f4b18b0564feb5e5f77c28715e0
-
SHA256
0b259fca9d217f21c423127618282186624add359cdeb07b3f61af39e809d280
-
SHA512
aaf018fb588d92563fc79a66c5618a2875062981caf9443ab462cb0e054868368c6632ca42022bf745cd6d199a2a26546258f95629e415aa011b28339af20c1e
-
SSDEEP
384:oQARl8qiEK/QkKqnOmMyxvXwdHwofLDxL2oNojB6tHD:oQi2QNjyxvwdHVD5sMtj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06a77d4d67424baa348a7d4c6fcd1ffd
Files
-
06a77d4d67424baa348a7d4c6fcd1ffd.dll windows:4 windows x86 arch:x86
3befe787b519615637012419abe21221
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
GetModuleFileNameA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GlobalFree
GlobalUnlock
GetPrivateProfileStringA
SetUnhandledExceptionFilter
Thread32Next
SetThreadContext
OpenThread
CreateMutexA
IsBadReadPtr
WideCharToMultiByte
GetModuleHandleA
ReadProcessMemory
WriteProcessMemory
GetLastError
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
TerminateThread
Sleep
CreateThread
GlobalAlloc
GlobalLock
LoadLibraryA
GetProcAddress
Thread32First
GetCurrentThread
user32
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
memset
wcslen
strcmp
fopen
sprintf
memcpy
??2@YAPAXI@Z
strcpy
strcat
strrchr
strlen
strncpy
strstr
??3@YAXPAX@Z
sscanf
fclose
fread
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ