ProcDeListing
Static task
static1
Behavioral task
behavioral1
Sample
2cc54c54b0d7d689a18466d75edb74c6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2cc54c54b0d7d689a18466d75edb74c6.dll
Resource
win10v2004-20231215-en
General
-
Target
2cc54c54b0d7d689a18466d75edb74c6
-
Size
8KB
-
MD5
2cc54c54b0d7d689a18466d75edb74c6
-
SHA1
225445d9a3ceebb3951932d2d26be01587b9650b
-
SHA256
6a0901fb3142b445a1acc752295c69f8619ee5a961a82f5e4330977266b83c3b
-
SHA512
99318eb4e53f71652eab7e332c46e7f52f59358202aee40f97ea6776d9134e4fdb3a15e88a07e8491f419b6382e61141b7878b93b6fd778ec2744daa09332ef9
-
SSDEEP
96:nPImDejAZ+RSSSSMgK5tv5EgZ72nYcTnnpO1gvRix7F4:nwuZ+RSSSSl0PcTnpWpF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cc54c54b0d7d689a18466d75edb74c6
Files
-
2cc54c54b0d7d689a18466d75edb74c6.dll windows:1 windows x86 arch:x86
4aef5c20b74a50ccf54501baa67b4158
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
TlsFree
LocalFree
HeapAlloc
TlsGetValue
TlsAlloc
Sleep
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
TlsSetValue
GetVersion
HeapFree
LocalAlloc
advapi32
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
user32
SendMessageA
GetWindowTextA
GetWindowLongA
GetClassNameA
CallNextHookEx
Exports
Exports
Sections
CODE Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ