Static task
static1
Behavioral task
behavioral1
Sample
01a63af7ec586ecd73bbfb8dbd7e911e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01a63af7ec586ecd73bbfb8dbd7e911e.dll
Resource
win10v2004-20231215-en
General
-
Target
01a63af7ec586ecd73bbfb8dbd7e911e
-
Size
27KB
-
MD5
01a63af7ec586ecd73bbfb8dbd7e911e
-
SHA1
ddac67c282af5ba38848830c323a862670cbe6fd
-
SHA256
c94ec8c95526c2543ffc948623ddacfe295ffd96761bcd884c42b31a692b71e6
-
SHA512
0af928a128aa5df66619a6dd2d19b0c4fb370d886ff6beb9cca8c3adfa9322cc83641711f4f9a2906eceda0e33d0de6c100380195655b082c12e668a68e5e9be
-
SSDEEP
384:cT1HK7Zm7H+ZVZ/pinVDTGJfyUXtL5bc93sQyVB28cHMfgZvjMAHWQH:WmnDcpTGJfy0t5ws/WHgkPHv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01a63af7ec586ecd73bbfb8dbd7e911e
Files
-
01a63af7ec586ecd73bbfb8dbd7e911e.dll windows:4 windows x86 arch:x86
bb86b360b6ce87ad54f55f28c0f9804f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
LoadLibraryA
GetModuleHandleA
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
GetCommandLineA
TerminateProcess
ReadProcessMemory
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
VirtualAlloc
GetTempPathA
CreateFileA
ReadFile
CloseHandle
GetLocalTime
DeleteFileA
Sleep
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
MultiByteToWideChar
GetLastError
user32
GetWindowThreadProcessId
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
FindWindowA
GetKeyboardState
ToUnicode
wininet
InternetCloseHandle
InternetReadFile
msvcrt
??3@YAXPAX@Z
strchr
fclose
fread
fopen
_strcmpi
_stricmp
_strupr
_strlwr
atoi
strrchr
wcslen
memset
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ