ifroute
Static task
static1
Behavioral task
behavioral1
Sample
0c3fac7b1c48f399a755404bd924966d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c3fac7b1c48f399a755404bd924966d.dll
Resource
win10v2004-20231215-en
General
-
Target
0c3fac7b1c48f399a755404bd924966d
-
Size
13KB
-
MD5
0c3fac7b1c48f399a755404bd924966d
-
SHA1
f505102069821e715258ae9e0a8e496797a0f82d
-
SHA256
16714bfba0d7ba2d5370b96a4ee28fc6523f12803185d6ec873e15dc6b5d563b
-
SHA512
fcd73181fe2098ebb79f50ba7b1eb21c42a072a473c2646b0356bcaa81981704e8a4ddb7ec758694f20a0697d4c081ba644ad357481758d4077c3fd79d4855ff
-
SSDEEP
192:z1zEEfLC3PqHaQJj+QHPeS4eAH6s9Ts/iF9E/CIs6e82j2EsyI0VlEF0ETDi:JEEfW3PFdQHPeSu6sxsKF6NryIeEu+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c3fac7b1c48f399a755404bd924966d
Files
-
0c3fac7b1c48f399a755404bd924966d.dll windows:4 windows x86 arch:x86
c94f214c5066436706ac1b34822092d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
RegisterClassA
SetCapture
UnhookWinEvent
UnpackDDElParam
MessageBeep
AnyPopup
BeginDeferWindowPos
AttachThreadInput
kernel32
QueryPerformanceCounter
GetModuleHandleW
lstrcpyA
Sleep
LoadLibraryExA
CreateFileA
DeleteFileA
ExitProcess
gdi32
SetWorldTransform
SetDCPenColor
Pie
ws2_32
WSASocketA
gethostbyname
recv
setsockopt
socket
oleaut32
RegisterActiveObject
GetActiveObject
ntdll
NtWaitLowEventPair
NtQuerySemaphore
NtPrivilegeCheck
NtAlertThread
RtlGetProcessHeaps
Exports
Exports
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 946B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ