Static task
static1
Behavioral task
behavioral1
Sample
266134dbec035d2d7ca6985aaf84e665.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
266134dbec035d2d7ca6985aaf84e665.dll
Resource
win10v2004-20231215-en
General
-
Target
266134dbec035d2d7ca6985aaf84e665
-
Size
28KB
-
MD5
266134dbec035d2d7ca6985aaf84e665
-
SHA1
bf4a5e524da7a3479f9b5db4f1aac1c107c005af
-
SHA256
52f75699285de0ecfdb853cfe44de57bc9b37dd95d94f7db6e50390170c99e3e
-
SHA512
a6014006cc531da289d8fe772b9a236c31dde69185fded02d357aa1f68fff9a430fcbcb16f173525401ef5b9668537811c8ba2efde6b415ab40803450ebf9636
-
SSDEEP
384:B6r8oWedEHHes9TAGjEIV47ANe3jv0yb2X0ToXR0OXJDAre329hINx4da0El8cr:B+GlgQ6nRToXRb5DAZKx4da0El
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 266134dbec035d2d7ca6985aaf84e665
Files
-
266134dbec035d2d7ca6985aaf84e665.dll windows:4 windows x86 arch:x86
016965e92fc17f2de8efaadf46754714
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTempPathA
VirtualAlloc
ExitProcess
VirtualFree
LoadLibraryA
WritePrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtect
WideCharToMultiByte
LeaveCriticalSection
GetModuleHandleA
GetProcAddress
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
ReadProcessMemory
WriteProcessMemory
GetPrivateProfileStringA
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
EnterCriticalSection
CreateThread
user32
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
UnhookWindowsHookEx
GetForegroundWindow
GetWindowTextA
SetWindowsHookExA
wininet
InternetCloseHandle
InternetReadFile
shlwapi
PathFileExistsA
msvcrt
_initterm
malloc
_adjust_fdiv
_strupr
_stricmp
_strlwr
_strnicmp
free
wcslen
strcmp
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
atoi
strchr
strstr
fclose
fread
fopen
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ