Static task
static1
Behavioral task
behavioral1
Sample
1a103bfbe811757f0fc5e0aec2fd5210.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a103bfbe811757f0fc5e0aec2fd5210.dll
Resource
win10v2004-20231215-en
General
-
Target
1a103bfbe811757f0fc5e0aec2fd5210
-
Size
101KB
-
MD5
1a103bfbe811757f0fc5e0aec2fd5210
-
SHA1
a863bea74fffd82dfc1a05d99666904664c87220
-
SHA256
e74fe8d350896277a03b88ed48cdd883386394f880cbbcfdf5d9a7cd012f3cda
-
SHA512
59fb94a4110c3ab95700776699006ef7e2d7f82be853c6fac5e3f24eed1e42565df5adc1508bd6e256df5917eb4af2ebfe23308f3328bb592dcb2d674ddff5a6
-
SSDEEP
3072:J+JVuiL43JkTZp7KF+QzV4b76FKbtGjvI:J6wiL45kTYzObDEc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a103bfbe811757f0fc5e0aec2fd5210
Files
-
1a103bfbe811757f0fc5e0aec2fd5210.dll windows:4 windows x86 arch:x86
bb8dac29cdda5ac9af46bd7baef9121b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeResource
GetCurrentProcessId
GetFileTime
GetProcAddress
GetSystemTimeAsFileTime
HeapAlloc
HeapCreate
MulDiv
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnlockFile
lstrcatA
lstrcpynA
lstrlenA
user32
CallWindowProcA
DestroyMenu
DestroyWindow
GetWindowRect
IsDialogMessageA
IsWindow
IsWindowEnabled
IsWindowVisible
PostMessageA
PtInRect
RegisterClipboardFormatA
SetWindowPos
ValidateRect
Sections
CODE Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ