Static task
static1
Behavioral task
behavioral1
Sample
11e3271a3394a83d4551bdbde167e9bb.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11e3271a3394a83d4551bdbde167e9bb.dll
Resource
win10v2004-20231215-en
General
-
Target
11e3271a3394a83d4551bdbde167e9bb
-
Size
19KB
-
MD5
11e3271a3394a83d4551bdbde167e9bb
-
SHA1
6fb0e5019d1050328f61d5a5a5780e1dca52138c
-
SHA256
5a119766a9608c5839e66c6d5a38d5e849acaf948d7f71e3880f7c1c0d624f6b
-
SHA512
61f7ea5735f3de01b850cc5e9df0bf2ba4040357709195cf2192db00a292a5e90528fa1cd08509cc91667abf2681866f6649f36363e337f78a421a81a2b3a3f2
-
SSDEEP
384:yASHV4JjasMJfoqc/3xKf1ADIyz2Quu3q+ckOmHdsskF2:h2Hfo1/BOADfuuaCOm5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11e3271a3394a83d4551bdbde167e9bb
Files
-
11e3271a3394a83d4551bdbde167e9bb.dll windows:4 windows x86 arch:x86
f4df260d4e8867649d668152980d54cd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetPrivateProfileStringA
IsBadReadPtr
ExitProcess
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
TerminateProcess
InitializeCriticalSection
VirtualProtect
GetModuleHandleA
GlobalFree
RaiseException
WideCharToMultiByte
LoadLibraryA
ReadProcessMemory
SetThreadContext
SetUnhandledExceptionFilter
WriteProcessMemory
Sleep
SetThreadPriority
WaitForSingleObject
CloseHandle
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
GetModuleFileNameA
CreateThread
TerminateThread
GetCurrentProcessId
CreateMutexA
GetProcAddress
GetLastError
user32
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowTextA
GetForegroundWindow
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_stricmp
_adjust_fdiv
_strlwr
fopen
fread
fclose
strstr
strcat
sprintf
strcpy
memcpy
strrchr
memset
strlen
??2@YAPAXI@Z
strcmp
wcslen
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ