KS
Static task
static1
Behavioral task
behavioral1
Sample
2cf3de3fc6c4f9025fc5872e828649db.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cf3de3fc6c4f9025fc5872e828649db.dll
Resource
win10v2004-20231215-en
General
-
Target
2cf3de3fc6c4f9025fc5872e828649db
-
Size
24KB
-
MD5
2cf3de3fc6c4f9025fc5872e828649db
-
SHA1
9768f64dabe84601ccbc6de126884992855bcd07
-
SHA256
07cb334e8c84e35763a48c19f6170037bc16bc8f317c6f1e7eaf7d183615c77c
-
SHA512
8f38a791f0164f06e07206fcb20f30b22be93d2de7563f2abbd81745a86b1dce56e3196d493c16df77f23310d90823274220ce44cb5a41c5f2be2f78e05065e4
-
SSDEEP
96:39iWzh36CY/vKmfj3bCSud90QWiMrBLK3IzHrn03brUAW25AFy2G7WkSre:38Wzh36X39JK3ITr036QAk2i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cf3de3fc6c4f9025fc5872e828649db
Files
-
2cf3de3fc6c4f9025fc5872e828649db.dll windows:4 windows x86 arch:x86
d06475adc2712d9786fc6db6353a5661
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetProfileIntA
lstrcatA
GetCurrentProcessId
GetLocalTime
lstrcpyA
GetCurrentThreadId
user32
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
SetWindowsHookExA
CallNextHookEx
GetKeyboardState
GetActiveWindow
wsprintfA
GetWindowTextA
ToAscii
msvcrt
_adjust_fdiv
malloc
_initterm
free
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 969B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ