Static task
static1
Behavioral task
behavioral1
Sample
14b0ace1e9038968c4dd3c4c20b5e6f2.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14b0ace1e9038968c4dd3c4c20b5e6f2.dll
Resource
win10v2004-20231215-en
General
-
Target
14b0ace1e9038968c4dd3c4c20b5e6f2
-
Size
24KB
-
MD5
14b0ace1e9038968c4dd3c4c20b5e6f2
-
SHA1
3925a8552e86f1d1a82849412d2727307d2b6ef0
-
SHA256
ac487acd24c6a3021aefb37bad9b72ec733de2ad7e552be10a64ddb7875f767e
-
SHA512
789265d65f6656fd15e78fdb2e948727a08a0019593931cdc31634b1ba1a8e702fb0e92de8724ca1cdb93a03c7216342522f5ec24a58c98c7b38ffc477155b7f
-
SSDEEP
192:T2LvBgKrNh61qYS1LkEZXLIWxpDKpct5UV1a+btu:6G8YS14E9pDKpct5qa+Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14b0ace1e9038968c4dd3c4c20b5e6f2
Files
-
14b0ace1e9038968c4dd3c4c20b5e6f2.dll windows:4 windows x86 arch:x86
1f03b54ed071c7fa29f674045de8e4f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
atoi
memcpy
strncpy
strchr
strcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_itoa
_strlwr
kernel32
Sleep
LoadLibraryA
CopyFileA
GetProcAddress
GetModuleFileNameA
CreateThread
GetTempPathA
lstrcmpA
lstrlenA
lstrcpyA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
ExitProcess
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ