Static task
static1
Behavioral task
behavioral1
Sample
38b87a0191264b1b096fbc5442b235f9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38b87a0191264b1b096fbc5442b235f9.dll
Resource
win10v2004-20231215-en
General
-
Target
38b87a0191264b1b096fbc5442b235f9
-
Size
124KB
-
MD5
38b87a0191264b1b096fbc5442b235f9
-
SHA1
74b8627a7a8c81bf51022e85172e4ff27a3aee9c
-
SHA256
5d9bc746326ba1ecd1dd4f5eed15448871470cc1b2ab37c72e4609ad64b9627d
-
SHA512
8af458157446627e994eef5f1e52ab1500c8cb413b5a30a41817459e2e2207cf8a534671e87ec6947dfb07e65593347df99bcf239d418730c47483b265dda6e5
-
SSDEEP
768:D/ekWzhEqz+3p41mazxMqDvIpmvUzp6P:SkyhgazxdvIlzp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38b87a0191264b1b096fbc5442b235f9
Files
-
38b87a0191264b1b096fbc5442b235f9.dll windows:4 windows x86 arch:x86
f7cf3b67b3a821d0559b82fba303fea6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenProcess
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameA
GetProcAddress
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
GetCurrentThreadId
DisableThreadLibraryCalls
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
WideCharToMultiByte
TerminateProcess
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
LeaveCriticalSection
CreateThread
user32
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
GetKeyState
imagehlp
ImageUnload
ImageLoad
shlwapi
PathFileExistsA
msvcrt
fread
fopen
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
fclose
strstr
wcslen
strcmp
strncpy
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
rand
srand
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ