Static task
static1
Behavioral task
behavioral1
Sample
0c9745522b7e870788df8f40368c14a0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c9745522b7e870788df8f40368c14a0.dll
Resource
win10v2004-20231215-en
General
-
Target
0c9745522b7e870788df8f40368c14a0
-
Size
108KB
-
MD5
0c9745522b7e870788df8f40368c14a0
-
SHA1
1725d3de1ba4494f8ed8770a8c1d5f3ccadca661
-
SHA256
9aa8693436b5b00157cc9bbf6c61a54334c5364b5c62637734411989ab9d736c
-
SHA512
89a86ec7043e60b5405f2e6bec01d6f0c17701eba2c030800854482c4f9cf4ca32822bb05ec2e753ad264733214776cb4a7905748ac3005848523466eda41369
-
SSDEEP
1536:yK/MFocGogybG+60Q+uEEpBl2+Q1BvEnSpEqN2PpdGixX3jH7lolN05m:yUKocH6MQ+uZ0R15//arZXlolNcm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c9745522b7e870788df8f40368c14a0
Files
-
0c9745522b7e870788df8f40368c14a0.dll windows:4 windows x86 arch:x86
431f2294585a8dc3974536179a23c981
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
SizeofResource
LockResource
LoadResource
FindResourceA
GetProcAddress
CreateFileA
GetModuleFileNameA
GetWindowsDirectoryA
ReadFile
GetSystemInfo
RtlUnwind
RaiseException
ExitProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapAlloc
HeapFree
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
SetUnhandledExceptionFilter
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CloseHandle
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
VirtualProtect
advapi32
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
shlwapi
PathFileExistsA
wininet
GetUrlCacheEntryInfoA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ