Static task
static1
Behavioral task
behavioral1
Sample
127cd8d45dd64e408f8b6f15bbd11a54.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
127cd8d45dd64e408f8b6f15bbd11a54.dll
Resource
win10v2004-20231215-en
General
-
Target
127cd8d45dd64e408f8b6f15bbd11a54
-
Size
12KB
-
MD5
127cd8d45dd64e408f8b6f15bbd11a54
-
SHA1
ac577301119e8679a01cb148da2116bcadd30b23
-
SHA256
5acffef3296ae9d8a8d907f07deb2526796110ee18cd462697fc7cb98a54f603
-
SHA512
171f9937063aee110f5f4eb83e14b62279aaa63ec3e3e538df7d40802fdb173cb40f31aeb1cf5cbf2a55d5698ab42d225e5d119037957b9e53a0ee2cdb212f9e
-
SSDEEP
384:mkQ50aWu0VB1R73ZP9CIGioZaOMyUk9EoB:mVqaKR73d988OMF8EoB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 127cd8d45dd64e408f8b6f15bbd11a54
Files
-
127cd8d45dd64e408f8b6f15bbd11a54.dll windows:4 windows x86 arch:x86
3b7f4d0d2d2e56f7c1325c294c303915
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
OpenEventA
Sleep
GetFileSize
ReadFile
VirtualFreeEx
GlobalFree
GlobalLock
GlobalAlloc
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
IsBadReadPtr
GetWindowsDirectoryA
CreateEventA
SetThreadPriority
CreateThread
GetPrivateProfileStringA
CreateRemoteThread
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
VirtualFree
GetModuleFileNameA
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
GetInputState
PostThreadMessageA
GetMessageA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ