Static task
static1
Behavioral task
behavioral1
Sample
14a7e4fd37a2fbc41a0355df533753c9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a7e4fd37a2fbc41a0355df533753c9.dll
Resource
win10v2004-20231215-en
General
-
Target
14a7e4fd37a2fbc41a0355df533753c9
-
Size
37KB
-
MD5
14a7e4fd37a2fbc41a0355df533753c9
-
SHA1
fc7996329977175107a940b7691d9f4ccd1be4d2
-
SHA256
8df59d5bdf23a6f41877ce148c8b742ce7e54d1cbd1a0432b68fde418eb5e60c
-
SHA512
1f444200728fdd08ec63e1bdc5fd43509873c588b92e8bfcccf2ccb76658e8a79e0321fc00bbe78763890471d2a1cc95776f81aec0c16b5c7fb796994b2db0f5
-
SSDEEP
768:EXG8U6VRT6qyq8Z32sW9u8U7EnkfJu8kP:EXG8UuazLbfc8I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a7e4fd37a2fbc41a0355df533753c9
Files
-
14a7e4fd37a2fbc41a0355df533753c9.dll windows:6 windows x86 arch:x86
e9f86d51e7d84fa7f2caf55ed5a6c9cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
memcmp
memcpy
memset
_strnicmp
??1type_info@@UAE@XZ
strrchr
isdigit
_beginthread
strncmp
_itoa
fwrite
printf
atoi
fseek
ftell
fread
fopen
fclose
_strdup
isalnum
strchr
strstr
sprintf
tmpfile
realloc
free
??2@YAPAXI@Z
_iob
??3@YAXPAX@Z
fprintf
strncpy
memchr
malloc
psapi
GetModuleInformation
crypt32
CertGetIssuerCertificateFromStore
CertFreeCertificateContext
CertVerifyCertificateChainPolicy
CertNameToStrA
CertGetCertificateChain
CertOpenSystemStoreA
CertFreeCertificateChain
CertCloseStore
CertFindChainInStore
secur32
InitializeSecurityContextA
AcquireCredentialsHandleA
FreeContextBuffer
DecryptMessage
ApplyControlToken
QueryContextAttributesA
FreeCredentialsHandle
EncryptMessage
DeleteSecurityContext
kernel32
GetFileAttributesA
VirtualProtect
lstrcmpiW
GetModuleFileNameA
WinExec
lstrcmpA
GetProcAddress
OpenMutexA
CreateMutexA
CloseHandle
lstrlenA
Sleep
GlobalFree
OutputDebugStringA
MultiByteToWideChar
GetLastError
CreateFileA
GetModuleHandleW
WriteFile
GetCommandLineA
WideCharToMultiByte
GlobalAlloc
GetCurrentProcess
advapi32
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ