Static task
static1
Behavioral task
behavioral1
Sample
1d35cc901bf5e14a346f5b3483ba09d0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d35cc901bf5e14a346f5b3483ba09d0.dll
Resource
win10v2004-20231222-en
General
-
Target
1d35cc901bf5e14a346f5b3483ba09d0
-
Size
14KB
-
MD5
1d35cc901bf5e14a346f5b3483ba09d0
-
SHA1
fde9cb3a2abb4ad098557b0e9f0d527d6cbfcfd2
-
SHA256
2b5eb0bd4ba1341316926f15fe766f2252cd0fa670f7a1edf58f9c5a20fc60c8
-
SHA512
1f7d35ac096d2b00da147c4ffee82bde5c596a2d5e3967943702367e813b27197c08d48bb40c27a8ccb1883231b45492ce45b564b5318e074921657dd30b083e
-
SSDEEP
192:yeqPderB+XuZUQLTTj7mK8hcItYSaa9Hyh5SrXI1Xizo9SLnE:OYUQLTTj7mphHyf1yzo9a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d35cc901bf5e14a346f5b3483ba09d0
Files
-
1d35cc901bf5e14a346f5b3483ba09d0.dll windows:4 windows x86 arch:x86
1cda67f4e0b64959ac5e36535c4c4be9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
OpenEventA
Sleep
GetFileSize
ReadFile
GetModuleFileNameA
VirtualProtectEx
VirtualFreeEx
GlobalFree
GlobalLock
GlobalAlloc
GetCurrentProcess
CreateEventA
SetThreadPriority
CreateThread
OutputDebugStringA
IsBadReadPtr
GetPrivateProfileStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateRemoteThread
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
VirtualFree
ReadProcessMemory
VirtualAlloc
RtlUnwind
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowTextA
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ