fx
Static task
static1
Behavioral task
behavioral1
Sample
299c40213a899cf579441aa681a48456.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
299c40213a899cf579441aa681a48456.dll
Resource
win10v2004-20231222-en
General
-
Target
299c40213a899cf579441aa681a48456
-
Size
26KB
-
MD5
299c40213a899cf579441aa681a48456
-
SHA1
64e6736de3701c818d6863ee594300e9e04e20c7
-
SHA256
03f1532133dfad859ced5fc5cce192cedbb1bd72998c2d8d5a10cb8331e9222a
-
SHA512
27c14872ca93fb6ad43bc182a2171158f78a4564c725a92675d62b25e97c14538511ebd55936a857311614b8d7457305470b71154744633e7ee7dfa8b46c438a
-
SSDEEP
384:z6yQ0EiklRiB4+7o5alna+AEjy+sRUuR/bTa+kSBWn2F2CdHJL1B+NnOeY:tQ0EDe4BH+b3qbTa+kSSyHV1B+NnHY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 299c40213a899cf579441aa681a48456
Files
-
299c40213a899cf579441aa681a48456.dll windows:4 windows x86 arch:x86
c11c102481ab8759dae06804a5b6729a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
VirtualAlloc
GetProcAddress
LoadLibraryA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
GetSystemDirectoryA
WriteFile
DeleteFileA
SetFilePointer
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
WriteProcessMemory
ReadFile
CloseHandle
GetCommandLineA
IsBadReadPtr
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
InitializeCriticalSection
Sleep
user32
GetForegroundWindow
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowThreadProcessId
wininet
InternetCloseHandle
InternetReadFile
msvcrt
strcmp
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
fopen
fread
fclose
strstr
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
atoi
??3@YAXPAX@Z
strncpy
strchr
Exports
Exports
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ