Static task
static1
Behavioral task
behavioral1
Sample
1434ba9ea1721a744bf6d27bd4702a1a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1434ba9ea1721a744bf6d27bd4702a1a.dll
Resource
win10v2004-20231215-en
General
-
Target
1434ba9ea1721a744bf6d27bd4702a1a
-
Size
236KB
-
MD5
1434ba9ea1721a744bf6d27bd4702a1a
-
SHA1
160748bc544f7ed6fccb916ac211d849d76e397a
-
SHA256
15a56b3ebf7e84ca5aef735dbf62cae39d224ebdd18c39585821f39597cd084d
-
SHA512
1a011caf0f524c824030de13743b0b3548bb9f918502a82e43357caf85e6da1bd3bc4bb210fc2d6cdc2dd3b66b59015edb7bd65fd4847525838a9cada06e444a
-
SSDEEP
3072:4PSHzygp+XfoPAGyPEfl6PIfeB4j14lqwAuHa6Wk+CQCd1bKWy1Ti+XZbHj1/Vtf:QgpSfzQYi0a6WkK9pJZv4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1434ba9ea1721a744bf6d27bd4702a1a
Files
-
1434ba9ea1721a744bf6d27bd4702a1a.dll windows:4 windows x86 arch:x86
0eb533bbece06dc46fdc27f91026eed6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
SetFileTime
LoadLibraryW
ReadFile
GetCurrentDirectoryW
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
WideCharToMultiByte
GetFileAttributesW
CreateDirectoryW
WriteFile
GetProcAddress
FindClose
CreateFileW
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
Sections
.text Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ