Static task
static1
Behavioral task
behavioral1
Sample
0ee13f4c9f08bd57f8f6ff415ba6c640.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ee13f4c9f08bd57f8f6ff415ba6c640.dll
Resource
win10v2004-20231215-en
General
-
Target
0ee13f4c9f08bd57f8f6ff415ba6c640
-
Size
11KB
-
MD5
0ee13f4c9f08bd57f8f6ff415ba6c640
-
SHA1
dbf1c33b1ea4ce7fb6047de26ee06f8d3db1737e
-
SHA256
73f2cc243180e0bfd17070fa291ad7d8505e931095c95ba87ad296441ec0ff11
-
SHA512
a38630a7ef743e3c9c9028c400a2dd14dff21651dd32c72fcba227a269a10a10a835091883eb73bd89adda845e2894173d1af5276681d420fce04498ebd580a7
-
SSDEEP
192:SPVyU35s70v9KUS7/scpCg32NDu8YlL6:uVn5o0cUS7UHLu8IL6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ee13f4c9f08bd57f8f6ff415ba6c640
Files
-
0ee13f4c9f08bd57f8f6ff415ba6c640.dll windows:4 windows x86 arch:x86
41e02b4ce14c7471974146c62f338e92
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
OpenEventA
Sleep
GetFileSize
ReadFile
VirtualFreeEx
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
GlobalFree
GlobalLock
GlobalAlloc
CreateThread
CreateEventA
SetThreadPriority
GetCommandLineA
CreateRemoteThread
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
VirtualFree
GetModuleFileNameA
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
GetInputState
PostThreadMessageA
GetMessageA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ