Static task
static1
Behavioral task
behavioral1
Sample
081bf8533e3948640b293ed616b40488.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
081bf8533e3948640b293ed616b40488.dll
Resource
win10v2004-20231215-en
General
-
Target
081bf8533e3948640b293ed616b40488
-
Size
60KB
-
MD5
081bf8533e3948640b293ed616b40488
-
SHA1
e9c5f812dcf59d5f1d7d8d45e246688a1bc61577
-
SHA256
ad370a67b0147199ca431ee60ecc4f11cb5e8e6aa34769f32541a1b0a15ab5e2
-
SHA512
a0403562aa53bbcdd1d06ede6092cf2492f5474b2650fca3be87def7d6e47feef4cec4bad7ba66daa04f506766f4c4ce6e9c0c647e210f51b082b724577d8186
-
SSDEEP
768:1ZaY0AT+1mocpz7pXwG/GUUlyCwqkFYyxGl7oiL2tlDFW7AIE:yaTjoSv7lUlyCwDFNPjzDFM7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 081bf8533e3948640b293ed616b40488
Files
-
081bf8533e3948640b293ed616b40488.dll windows:4 windows x86 arch:x86
dc1aba46952ff035d20d5287581cb25b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
GlobalFree
WriteFile
CreateFileA
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
WinExec
lstrcmpA
ReadFile
OutputDebugStringA
GetLastError
lstrcatA
GetWindowsDirectoryA
GetProcAddress
lstrcpynA
GlobalAddAtomA
GlobalFindAtomA
Sleep
lstrcpyA
OpenFile
DeleteFileA
GetCurrentProcess
GetSystemDirectoryA
OpenProcess
TerminateProcess
GetCurrentProcessId
CreateThread
GetSystemInfo
VirtualProtect
lstrlenA
CompareStringA
CreateToolhelp32Snapshot
Process32First
Module32First
Module32Next
CloseHandle
LoadLibraryA
Process32Next
ExitProcess
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
user32
PostMessageA
MessageBoxA
GetWindowTextA
advapi32
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSaveKeyA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ