Static task
static1
Behavioral task
behavioral1
Sample
0fa18d23932664b395985dc4a2b15315.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0fa18d23932664b395985dc4a2b15315.dll
Resource
win10v2004-20231215-en
General
-
Target
0fa18d23932664b395985dc4a2b15315
-
Size
24KB
-
MD5
0fa18d23932664b395985dc4a2b15315
-
SHA1
b193881616b249b2f5402442fd7a467b4ff2e1ad
-
SHA256
159c8dac1173ee5bbf77a5f53fb6eb20045745c9c0bce1a490bb4a9ea705cdba
-
SHA512
0e642207e1a8508e9a8f5cbcb846bc77888bb50b90e1beb6613a91ea2958a0c666b9c20777f6ba64bf97b4f39836085fb4157bbdf0a298617d7ecd97d3ceddb9
-
SSDEEP
384:BpRQ6A0iFR0yV/b9tmVtcCKpct5EMe0R:jRQ63+/LmVt0at5EM3R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fa18d23932664b395985dc4a2b15315
Files
-
0fa18d23932664b395985dc4a2b15315.dll windows:4 windows x86 arch:x86
0ba6c6bf21ccdeb054ffd531163a0e24
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
ntohs
ntohl
msvcrt
atoi
free
_initterm
memcpy
_adjust_fdiv
_itoa
strcmp
strstr
strrchr
fseek
ftell
??2@YAPAXI@Z
strchr
strncpy
??3@YAXPAX@Z
fopen
fwrite
fclose
fread
time
memset
_strlwr
malloc
kernel32
ExitProcess
CreateThread
GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcAddress
GetTempPathA
lstrcmpA
lstrcpyA
lstrlenA
ReadProcessMemory
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
lstrcatA
Sleep
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1014B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 674B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ