f1
Static task
static1
Behavioral task
behavioral1
Sample
10114b3d57cbedb4fe9f0b7fec3e9874.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10114b3d57cbedb4fe9f0b7fec3e9874.dll
Resource
win10v2004-20231222-en
General
-
Target
10114b3d57cbedb4fe9f0b7fec3e9874
-
Size
11KB
-
MD5
10114b3d57cbedb4fe9f0b7fec3e9874
-
SHA1
d1e813a94610ff52112c04aaf2c591c42a80527d
-
SHA256
81e8f155778d558dd8b51b803d445c6c286521174f742f42a03311d579b4c0c0
-
SHA512
fe481c9cee7b5b5954f23919c74c86536b627c8ce90797d201ce067dd4f48b236c05f41a61c9ffb133ef5087238ecaf5ada35a69a328fff2f03e524dfad9cdfc
-
SSDEEP
192:J6Lyy1iGkZmVM+iieNdB0vGms+g+ppTKWIhidg5:JQiGELikSvGms+g+pDIhi2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10114b3d57cbedb4fe9f0b7fec3e9874
Files
-
10114b3d57cbedb4fe9f0b7fec3e9874.dll windows:4 windows x86 arch:x86
b9d5e2db2be9bce983dc77e14554e073
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
Thread32Next
TerminateThread
GetThreadPriority
CloseHandle
GetCurrentProcessId
GetModuleHandleA
Thread32First
CreateToolhelp32Snapshot
GetPrivateProfileStringA
Sleep
VirtualProtectEx
ExitProcess
IsBadReadPtr
CreateThread
WideCharToMultiByte
GetProcAddress
GetModuleFileNameA
user32
SetWindowsHookExA
CallNextHookEx
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
memset
_adjust_fdiv
malloc
_initterm
free
strcat
strrchr
strcpy
strlen
_stricmp
memcpy
??3@YAXPAX@Z
sprintf
??2@YAPAXI@Z
Exports
Exports
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wsdt Size: 512B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 742B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ