InstallHook
Static task
static1
Behavioral task
behavioral1
Sample
2b0e8bd3fdccfc58e27194310459c35e.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b0e8bd3fdccfc58e27194310459c35e.dll
Resource
win10v2004-20231222-en
General
-
Target
2b0e8bd3fdccfc58e27194310459c35e
-
Size
72KB
-
MD5
2b0e8bd3fdccfc58e27194310459c35e
-
SHA1
27290a505e3e2d0cdfeefd1911c1d34048055a7d
-
SHA256
c5bfdb2b2a0b211892a5959a257a6d19044a2f8b70b04a6c5279a9f1743fca7b
-
SHA512
7417bbe1874e39e66a89151b56e51ba50b7ac5b82e78c65b3d435a1997764df5892f05c1c9f1920a1e64b4cf5a63cd0a40dd30e83a17eb468d511b0b706aec1a
-
SSDEEP
1536:X0PGh363Ica7f+0Vc8Hj0UxHZ2VL7nAAannADy:XGe362r/cIGEnnADy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b0e8bd3fdccfc58e27194310459c35e
Files
-
2b0e8bd3fdccfc58e27194310459c35e.dll windows:4 windows x86 arch:x86
71ef59b6aa9beb04f020b551b6889278
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
VirtualProtect
VirtualQuery
GetProcAddress
GetModuleHandleA
LoadLibraryA
CloseHandle
CreateThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetCurrentProcessId
GetSystemInfo
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
HeapSize
SetStdHandle
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
HeapReAlloc
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
user32
ToAsciiEx
SetWindowsHookExA
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wininet
InternetReadFile
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetOpenA
InternetConnectA
imagehlp
ImageDirectoryEntryToData
ws2_32
WSARecv
inet_addr
ntohl
connect
inet_ntoa
htonl
recv
send
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ