mdfpro
Static task
static1
Behavioral task
behavioral1
Sample
1e5d02f229ce8d320c22d379511b547a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e5d02f229ce8d320c22d379511b547a.dll
Resource
win10v2004-20231222-en
General
-
Target
1e5d02f229ce8d320c22d379511b547a
-
Size
28KB
-
MD5
1e5d02f229ce8d320c22d379511b547a
-
SHA1
a2def25ffcc1d27fcb287d9f2cf35c7c36f4fd87
-
SHA256
432b34e301d81a0f25a796ebaf9b42d454586c394fb89e2bc1b1bae84e772279
-
SHA512
decf857b30542f748f8ae734f82a9f8c7eee14e141ae2eb2ddcf3fa48b9ee73b69137bb9acf6e8b7dc8a1890665c9833ed212c3355fe1db130e509539dc7861f
-
SSDEEP
768:1ELCRLis+7TOZKjLC1JkcDpcsycSEzaRfVJ5ET1x6ecK:1x0ukUpLyWuln5q6nK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e5d02f229ce8d320c22d379511b547a
Files
-
1e5d02f229ce8d320c22d379511b547a.dll windows:4 windows x86 arch:x86
0aa6f82a72d48ee1e0251411462cbb2f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowTextA
GetForegroundWindow
GetDlgItemTextA
GetClassNameA
EnumChildWindows
CharLowerA
wsprintfA
kernel32
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempPathA
ConnectNamedPipe
HeapAlloc
HeapFree
IsBadCodePtr
LoadLibraryA
LocalAlloc
LocalFree
LockFile
MapViewOfFile
OpenProcess
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
ord5
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CloseHandle
GetTickCount
VirtualAlloc
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempPathA
ConnectNamedPipe
HeapAlloc
HeapFree
IsBadCodePtr
LoadLibraryA
LocalAlloc
LocalFree
LockFile
MapViewOfFile
OpenProcess
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
ord5
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CloseHandle
GetTickCount
VirtualAlloc
shell32
ShellExecuteA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
wininet
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
ws2_32
WSACleanup
accept
bind
closesocket
connect
gethostbyname
htons
inet_addr
listen
recv
send
shutdown
socket
WSAStartup
ole32
CoTaskMemFree
Exports
Exports
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ