Static task
static1
Behavioral task
behavioral1
Sample
01b36d6d752180fcc3b706e459315f6e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01b36d6d752180fcc3b706e459315f6e.dll
Resource
win10v2004-20231215-en
General
-
Target
01b36d6d752180fcc3b706e459315f6e
-
Size
19KB
-
MD5
01b36d6d752180fcc3b706e459315f6e
-
SHA1
37ea062f184af933f157b75f1edcbd4d5aa9fc8a
-
SHA256
c600c5b5ada6f7dd6ea74526ddf55adbb48c2cab79b97ffa368c0aca91bb2b1b
-
SHA512
5fcf567cb2da20686af2d919de9519bbb99744a55f391f827a2847c637e7d371995c6348b43f133c13d48f6561ea8d419d528290673fbc61eca2bfb11daaaead
-
SSDEEP
384:F20+6eWZ6J/L+5f2rlPP5ims5M+ufYtUo6jEwq:00+6XZ6ZL+o6tm+geUo6jEwq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01b36d6d752180fcc3b706e459315f6e
Files
-
01b36d6d752180fcc3b706e459315f6e.dll windows:4 windows x86 arch:x86
4ede995e52f513871000736e99a7b62d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileStringA
Sleep
CreateThread
CloseHandle
CreateEventA
OpenEventA
GetCommandLineA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
GetFileSize
ReadFile
VirtualProtectEx
SetThreadPriority
IsBadReadPtr
GlobalUnlock
VirtualAlloc
VirtualFree
GlobalAlloc
GlobalLock
ReadProcessMemory
GlobalFree
GetProcAddress
GetModuleFileNameA
user32
UnhookWindowsHookEx
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetInputState
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ