Static task
static1
Behavioral task
behavioral1
Sample
01ce7c1df312054fd3c59a2ab4f847ff.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01ce7c1df312054fd3c59a2ab4f847ff.dll
Resource
win10v2004-20231222-en
General
-
Target
01ce7c1df312054fd3c59a2ab4f847ff
-
Size
963KB
-
MD5
01ce7c1df312054fd3c59a2ab4f847ff
-
SHA1
5a0fc277e50c9bf2c13271d0b6ccb46ecb204206
-
SHA256
544c233b44970dd35cf42b572aa7332b9d1814d170ad00218a728ebcecb06ba1
-
SHA512
397f6393230af05787d054243149407be2aaf3c237acc543fb0e6ed4172a9d37c37ec83530e3e29ea01c00ca4aa837b18aa7419c28f090248620d00f14b7f14c
-
SSDEEP
24576:8cEyB9xfuTIhRHK3kOHV38/VZotrnL9fBDzr5n:8cDE6Rruxgmrn5fT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01ce7c1df312054fd3c59a2ab4f847ff
Files
-
01ce7c1df312054fd3c59a2ab4f847ff.dll windows:4 windows x86 arch:x86
58002ec58ca142adfe52de84b4004fb6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFileSize
CreateFileA
GetPrivateProfileStringA
GetCurrentProcessId
GetTickCount
SetFilePointer
HeapAlloc
GetProcessHeap
VirtualProtect
Process32Next
Process32First
ReadFile
Module32Next
Module32First
OpenProcess
GetLastError
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
LoadLibraryA
GetCommandLineA
IsBadReadPtr
SetEvent
CloseHandle
GetModuleFileNameA
Sleep
GetCurrentProcess
TerminateProcess
OpenEventA
CreateEventA
CreateToolhelp32Snapshot
CreateThread
user32
wsprintfA
wvsprintfA
FindWindowExA
GetWindowLongA
GetWindowTextA
IsWindowVisible
FindWindowA
GetWindowThreadProcessId
MapVirtualKeyA
GetKeyboardState
ToAscii
SetWindowsHookExA
BroadcastSystemMessageA
CallNextHookEx
advapi32
RegSetValueExA
RegSetValueA
RegCreateKeyA
RegOpenKeyA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
msvcrt
_except_handler3
memcpy
sprintf
realloc
_strlwr
_initterm
_adjust_fdiv
_strcmpi
strcpy
strcat
strlen
strcmp
strncpy
memset
free
strchr
strstr
malloc
strrchr
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ