Activate
Static task
static1
Behavioral task
behavioral1
Sample
08fac9b0612905f557c18916f404b419.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08fac9b0612905f557c18916f404b419.dll
Resource
win10v2004-20231215-en
General
-
Target
08fac9b0612905f557c18916f404b419
-
Size
22KB
-
MD5
08fac9b0612905f557c18916f404b419
-
SHA1
3e628c1b24fb2e473629cabc4e09e3debd500f67
-
SHA256
f479d10519da0b200e6abb96703bef8321e0b434578a60ab063213de18009664
-
SHA512
e7f948e8d9f868a5cdc4c92355ffb7303ac4513188d60c04ddc7b99d20f0cf1a05ce74e674e38e3416655a1d0e762a8e0458e3349b65325a242072a1d7fd457a
-
SSDEEP
384:h7Z3x1RWjGu8UJn9QNTjsT3rdTFqMg4HfwPMl:hB0j5T3Bp3gm5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08fac9b0612905f557c18916f404b419
Files
-
08fac9b0612905f557c18916f404b419.dll windows:4 windows x86 arch:x86
128e5e1c7a17d533064c2b432c0370fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSACleanup
WSAStartup
recv
closesocket
send
gethostbyname
htons
socket
connect
kernel32
CloseHandle
OpenEventA
SetEvent
VirtualQuery
CreateThread
GetTickCount
lstrcatA
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcmpiA
lstrcpyA
lstrcpynA
GetSystemTime
GlobalFree
GlobalAlloc
lstrcmpA
DeleteFileA
GetTempFileNameA
GetTempPathA
WinExec
GetModuleFileNameA
RtlUnwind
WriteFile
CreateFileA
CreateProcessA
GetLastError
FileTimeToSystemTime
FindFirstFileA
FindClose
GetComputerNameA
Sleep
CreateMutexA
ExitProcess
user32
SetWindowsHookExA
CallNextHookEx
SendMessageA
CharLowerA
wsprintfA
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 518B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ