Static task
static1
Behavioral task
behavioral1
Sample
00f40801cc5c090ed6cc743797d83df6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00f40801cc5c090ed6cc743797d83df6.dll
Resource
win10v2004-20231215-en
General
-
Target
00f40801cc5c090ed6cc743797d83df6
-
Size
15KB
-
MD5
00f40801cc5c090ed6cc743797d83df6
-
SHA1
64c0f593979569aa168722c38bdd47d4b0e4d3b6
-
SHA256
7c4018171b71107b27bab8516dea1d0064c863dcfd078ef31ec5bea8a8325905
-
SHA512
4a6fa949f9737567d2acb430cb8a89bd38d1daea5b812650d8732cb2a3f93e03fd024974469028ff6639f11d92d1c733555bf783829b8d97281858179e1e9864
-
SSDEEP
192:5PA1wzTauug1+u24eZFkznnmxJFj3KWKdgs7INy9L1HrQXxydlm06NDu85Zs7LTX:5Aip24eZFSmFUdB7IWMyqu8HuLTTr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00f40801cc5c090ed6cc743797d83df6
Files
-
00f40801cc5c090ed6cc743797d83df6.dll windows:4 windows x86 arch:x86
aee8bbacae1744e9796cdcbcd236ba95
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
WriteFile
OpenEventA
Sleep
GetFileSize
ReadFile
GetModuleFileNameA
GetCurrentProcessId
OutputDebugStringA
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
DeleteFileA
CreateEventA
SetThreadPriority
CreateThread
CopyFileA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
ExitProcess
GetComputerNameA
TerminateProcess
IsBadReadPtr
GetModuleHandleA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CreateRemoteThread
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
VirtualFree
TerminateThread
VirtualAlloc
user32
EnableScrollBar
EnableMenuItem
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
DestroyIcon
DestroyMenu
DestroyWindow
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
CloseDesktop
FindWindowA
GetWindowThreadProcessId
wsprintfA
GetInputState
PostThreadMessageA
GetMessageA
DestroyCursor
gdi32
DeleteObject
CancelDC
Chord
Ellipse
CloseEnhMetaFile
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
OpenProcessToken
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ