DBOpenWithQ
Static task
static1
Behavioral task
behavioral1
Sample
3d414e7dbc96bb6b75288ee9f7de46a0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d414e7dbc96bb6b75288ee9f7de46a0.dll
Resource
win10v2004-20231215-en
General
-
Target
3d414e7dbc96bb6b75288ee9f7de46a0
-
Size
52KB
-
MD5
3d414e7dbc96bb6b75288ee9f7de46a0
-
SHA1
9f4a57e39ccb5f9093305f18f125685859719e81
-
SHA256
6d740ef55a6722caf39908898b8811ee4c5124a376b1c421c15a1a4b366123f5
-
SHA512
0b4709f5ced10dcaa802b29b7af09c5c5f6cdff534ec15bf24a66cdbc1a357d8938f03a5ae0b108fb3e19cc47deb779e38404dcd0f2a530dbbd9c85e307e6d43
-
SSDEEP
768:j2il6qRV8FQ6EquGxC6WCGu0+t2luVOCyi7Xo90b:Bw28FQWh0+EEVUaoKb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d414e7dbc96bb6b75288ee9f7de46a0
Files
-
3d414e7dbc96bb6b75288ee9f7de46a0.dll windows:4 windows x86 arch:x86
cd744077f5399244d20f248aac140f31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetStringTypeW
VirtualAlloc
LCMapStringA
MultiByteToWideChar
GetTickCount
LoadLibraryA
GetProcAddress
GetStringTypeA
lstrcmpiA
GetOEMCP
GetACP
LCMapStringW
VirtualFree
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
HeapReAlloc
GetCPInfo
RtlUnwind
user32
GetSystemMetrics
FindWindowA
GetDC
shlwapi
StrRChrA
advapi32
RegOpenKeyExA
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ