Static task
static1
Behavioral task
behavioral1
Sample
2c60627fc18b76200d9918e202865dcd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c60627fc18b76200d9918e202865dcd.dll
Resource
win10v2004-20231215-en
General
-
Target
2c60627fc18b76200d9918e202865dcd
-
Size
71KB
-
MD5
2c60627fc18b76200d9918e202865dcd
-
SHA1
fbcc0d475b7b64f6791d6493d72107951f49bbc9
-
SHA256
943f84cb22f88232026dc3c345bc6ae3553e2ea79a97830da9c7aab0d18bcddd
-
SHA512
c102f74d2afe03229dcf37d1a2441c3c38c2244a2fff2132485ddf518152561e9c5779f1ca5f23cb329707c6cf50f873771f290493556bab07d681a7a1fabe9e
-
SSDEEP
1536:3dQXuFl5EdjOCpVymSYRVsXGY6j+wXoKL0alW5yw17Pfxj:NQXuFoYCpHSYRQGYw3QalG17Pf1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c60627fc18b76200d9918e202865dcd
Files
-
2c60627fc18b76200d9918e202865dcd.dll windows:4 windows x86 arch:x86
a976dedfbf38cc3665fe0bca635cd64a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetDateFormatA
GetModuleHandleA
GetStdHandle
GlobalHandle
GlobalUnlock
HeapAlloc
HeapCreate
HeapSize
LCMapStringA
MulDiv
SetFilePointer
UnhandledExceptionFilter
VirtualFree
lstrcpyA
lstrlenW
user32
CallNextHookEx
CharUpperA
ClientToScreen
EqualRect
GetKeyState
GetMenuCheckMarkDimensions
GetParent
GetPropA
GetWindowDC
IsDialogMessageA
IsRectEmpty
IsWindow
KillTimer
LoadBitmapA
PeekMessageA
ReleaseCapture
SendDlgItemMessageA
Sections
CODE Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ