Update
Static task
static1
Behavioral task
behavioral1
Sample
232c31d5696e1f99111782ec7f4641ef.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
232c31d5696e1f99111782ec7f4641ef.dll
Resource
win10v2004-20231215-en
General
-
Target
232c31d5696e1f99111782ec7f4641ef
-
Size
32KB
-
MD5
232c31d5696e1f99111782ec7f4641ef
-
SHA1
384a7d5f64dce486c065b968ad20551e01614559
-
SHA256
64062a1205d70c2a1ed2a6e9350c8de10dc9d05b40ed34d98f838efcae8efe17
-
SHA512
34eb46f3fab9ad08a40556335076de9a84067aa4f944544fe9c398fbaa8dc1c7b7aa4189e6d019fdc2d1804d9e037b53fcc0bea36ecd8f9daf6e9e89bcaedaa0
-
SSDEEP
768:+OvUgJB0ofUmaDceJQERbWNv99VEtAs7cH7ZU:DvHJB0oUDpRCBatVe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 232c31d5696e1f99111782ec7f4641ef
Files
-
232c31d5696e1f99111782ec7f4641ef.dll windows:4 windows x86 arch:x86
cf7a5b0dec1a682eb857e0301ff21e13
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
BackupWrite
Beep
ExitProcess
GetCurrentProcess
GetOEMCP
GetProfileIntA
GlobalFindAtomA
HeapValidate
LoadResource
SetConsoleScreenBufferSize
VirtualProtectEx
WriteProfileSectionW
lstrlenA
advapi32
AllocateLocallyUniqueId
CryptSignHashW
GetNamedSecurityInfoW
ObjectCloseAuditAlarmA
OpenEventLogA
RegQueryValueExW
SetFileSecurityA
user32
CharToOemBuffW
CopyRect
DdeQueryStringA
DrawMenuBar
GetDC
GetKBCodePage
IMPSetIMEW
MessageBoxA
OemToCharA
SetWindowTextW
UnlockWindowStation
gdi32
DeleteEnhMetaFile
GetCharWidthA
GetClipRgn
GetEnhMetaFilePaletteEntries
GetMiterLimit
GetRgnBox
GetTextMetricsA
SetLayout
SetMapMode
SetMiterLimit
SetWorldTransform
UpdateColors
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE