Static task
static1
Behavioral task
behavioral1
Sample
1409f28d1441dff1561df5b1f1385c8a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1409f28d1441dff1561df5b1f1385c8a.dll
Resource
win10v2004-20231215-en
General
-
Target
1409f28d1441dff1561df5b1f1385c8a
-
Size
21KB
-
MD5
1409f28d1441dff1561df5b1f1385c8a
-
SHA1
afae82fd3fb46b04d9bd95e10e63d462518760e4
-
SHA256
8195cacc4807939e22f45b8d42f6590e1be69e0467a543b619e9be4f5bc5d0be
-
SHA512
f4c304c479740761efb9500b1ac63189d0ec073e61d8b56f572e69313de5ad79bbe38fd8b10ebba45fd6753ed7c89806c8fc7b99cfc8825b180c71ccec14ce20
-
SSDEEP
384:XGh8wg79zp+lfd4x//I4+eOupdHQmSi4E61nQvh2UrE:2h+7E4toeRrHzSCWnKh2Ur
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1409f28d1441dff1561df5b1f1385c8a
Files
-
1409f28d1441dff1561df5b1f1385c8a.dll windows:4 windows x86 arch:x86
91765f58f0e19f7ced20d373e47c8e39
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCommandLineA
Sleep
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
GlobalAlloc
GetFileSize
ReadFile
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
SetThreadPriority
IsBadReadPtr
ExitProcess
VirtualAlloc
VirtualFree
GetLocalTime
GlobalUnlock
GlobalLock
GlobalFree
GetModuleFileNameA
OpenEventA
CreateEventA
CreateThread
WriteFile
CloseHandle
user32
EnumChildWindows
FindWindowExA
FindWindowA
GetClassNameA
IsWindowVisible
ReleaseDC
GetDC
ClientToScreen
GetClientRect
ToAscii
MapVirtualKeyA
GetKeyboardState
GetKeyState
GetForegroundWindow
IsWindowEnabled
GetWindowThreadProcessId
GetWindowTextA
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
SendMessageA
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
gdi32
GetPixel
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ