Static task
static1
Behavioral task
behavioral1
Sample
22bb444ada42a6bd699df4b6d98f6134.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
22bb444ada42a6bd699df4b6d98f6134.dll
Resource
win10v2004-20231215-en
General
-
Target
22bb444ada42a6bd699df4b6d98f6134
-
Size
28KB
-
MD5
22bb444ada42a6bd699df4b6d98f6134
-
SHA1
ff9b6474639e32f240768d5deb67ab20bf54a98b
-
SHA256
c2480572786a33df188429e3b925f43ea734ce281683e50cdf549f75b5c94c97
-
SHA512
0b5d5c213f7b05c13ef03ffe4a07bd975926d5aacd7b61a2f35c578c6bb6d09735613caac763e1ee3f2b0d49d0c02612d12d1648de6dafd381f8a44363184947
-
SSDEEP
192:ljDpBQMKnnt2GgGbHtLDGu6fqcyAcRzpjh0X8pJr0o6hkcZu8+tGAKnWL7+:RvKnEOBLDgqcyAcispJrf6SGAuWL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22bb444ada42a6bd699df4b6d98f6134
Files
-
22bb444ada42a6bd699df4b6d98f6134.dll windows:4 windows x86 arch:x86
ecdc94d1b8edc3b6eb76b04ea79f7bc3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowTextA
FindWindowExA
FindWindowA
EnumChildWindows
EnableWindow
ws2_32
ntohs
closesocket
msvcrt
strcmp
free
_initterm
malloc
_adjust_fdiv
_itoa
atoi
strcpy
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
rand
fopen
fwrite
fclose
fread
time
memset
_strlwr
srand
kernel32
IsBadReadPtr
GetModuleFileNameA
GetTickCount
GetModuleHandleA
lstrlenA
CopyFileA
CreateThread
GetTempPathA
LoadLibraryA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
GlobalAlloc
GlobalLock
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
Sleep
lstrcmpA
lstrcpyA
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ