Static task
static1
Behavioral task
behavioral1
Sample
09237a46501f0b13777b9e37ca329d11.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09237a46501f0b13777b9e37ca329d11.dll
Resource
win10v2004-20231215-en
General
-
Target
09237a46501f0b13777b9e37ca329d11
-
Size
27KB
-
MD5
09237a46501f0b13777b9e37ca329d11
-
SHA1
1d97c5d08ce6856d6923ca7b7502dfdc36f3e2e7
-
SHA256
07913ca92b7bccd294cad8457e6b5332ca693bb82c89e5c18cff6e45b549f8f0
-
SHA512
f696f2bf989faa5899b250c10d181ec229fe4d03c99c6ab82ab9e40ab81f9e14da7b4398f289dda9cf8abf5433a8e7d8fd91438b14bd9518eb4085c796ff26d7
-
SSDEEP
768:Ew98UWQdSzn3c+lJQ0DURD0BSPnwtGL1:NFgznrdu0BDtGL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09237a46501f0b13777b9e37ca329d11
Files
-
09237a46501f0b13777b9e37ca329d11.dll windows:4 windows x86 arch:x86
293ee702e75222f3e69b8d313912124b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetPrivateProfileStringA
ExitProcess
GetModuleHandleA
IsBadReadPtr
GetCommandLineA
CreateMutexA
InitializeCriticalSection
VirtualProtectEx
WideCharToMultiByte
LeaveCriticalSection
GlobalFree
GetProcAddress
LoadLibraryA
SetThreadContext
SetUnhandledExceptionFilter
ReadProcessMemory
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
TerminateThread
WriteFile
SetEvent
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
EnterCriticalSection
GetTempPathA
user32
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
GetForegroundWindow
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_strlwr
_stricmp
strstr
wcslen
strcmp
fopen
strcat
sprintf
memcpy
strlen
strcpy
memset
??2@YAPAXI@Z
strrchr
strncpy
strchr
fclose
fread
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ