Static task
static1
Behavioral task
behavioral1
Sample
02a5ff74b472e8e4f4d7949702327849.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02a5ff74b472e8e4f4d7949702327849.dll
Resource
win10v2004-20231215-en
General
-
Target
02a5ff74b472e8e4f4d7949702327849
-
Size
10KB
-
MD5
02a5ff74b472e8e4f4d7949702327849
-
SHA1
2a6b75f8fe58b3bdb791ddb545119e30b21b793e
-
SHA256
ceb584cc4f9102782623a27759ac47854e9126bb0a829c125d2acf476d1416cf
-
SHA512
c81d9cc8b53760d109a71bd33f9166a7b709752d54c60133d40b3f69f2082ec82775184565505f17a8b9e5ff87cabc85799c064bfef0fe41e98236c5a2903d9a
-
SSDEEP
192:1yWJnfko6l7Frgqt12gZHEQNkW8XVB0NWNN8+imBasyEKSEd6JTdR:9xUlRrntwQNkX7NN8+iTcJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02a5ff74b472e8e4f4d7949702327849
Files
-
02a5ff74b472e8e4f4d7949702327849.dll windows:4 windows x86 arch:x86
007a04532945f4f918e6e713f12a8bae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CompareStringA
IsBadReadPtr
LoadLibraryA
GetModuleHandleA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringA
GetCurrentProcess
CreateThread
Sleep
GetTickCount
GetCurrentProcessId
FreeLibrary
GetModuleFileNameA
VirtualProtect
GetProcessHeap
OpenProcess
HeapAlloc
user32
FindWindowA
GetWindowThreadProcessId
SetTimer
GetMessageA
DispatchMessageA
TranslateMessage
KillTimer
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
msvcrt
strrchr
strstr
_except_handler3
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ