Static task
static1
Behavioral task
behavioral1
Sample
14cbba38c00922fd642fe19f315afb59.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14cbba38c00922fd642fe19f315afb59.dll
Resource
win10v2004-20231215-en
General
-
Target
14cbba38c00922fd642fe19f315afb59
-
Size
42KB
-
MD5
14cbba38c00922fd642fe19f315afb59
-
SHA1
0ef17e09b1e24c1b9387836d5d42c287e5cdefea
-
SHA256
5a84817cf915d666bd802713aff1beb44a665cb9158e36ced334b0a807887321
-
SHA512
6baddfc93d6e180a32705d55c4399acd25b5fc2625c19d6e91b2f982d02e398d4f3f1e099d6aa03bac86a58a3fc0e2523497a384fecf27998a77ac9221c6ce44
-
SSDEEP
768:C65ix9pcGfhDvVta8rzG93TLArpcnXyFMO1o9Iv:nWpZZDvPz4gciFjo2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14cbba38c00922fd642fe19f315afb59
Files
-
14cbba38c00922fd642fe19f315afb59.dll windows:4 windows x86 arch:x86
ef9206d7e50adf8af61984a903ed5943
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
GetCurrentThreadId
CloseHandle
GetTickCount
GetStdHandle
QueryPerformanceCounter
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ