Static task
static1
Behavioral task
behavioral1
Sample
40db1fc81542b062168c564d00c83097.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40db1fc81542b062168c564d00c83097.dll
Resource
win10v2004-20231222-en
General
-
Target
40db1fc81542b062168c564d00c83097
-
Size
6KB
-
MD5
40db1fc81542b062168c564d00c83097
-
SHA1
91d17776859cf4c624fe371590d8a55b1a25ff05
-
SHA256
002d99f07929aa3740d9e946aae62bee129fc263714fb88319bdf93b4bff2716
-
SHA512
ccca30c74aded7f15f90ee241038cc8f889b39b356b8cd5094ee636388e7de2dbddf7e31fbdc6f6b25275880d4be198bc7284afad07648fa408c3027741ae03c
-
SSDEEP
96:3IRc4RBs6ItC8NL5EdYUmHCj74iAu/8I7H:7ksNC65EdY3ij74iFkI7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40db1fc81542b062168c564d00c83097
Files
-
40db1fc81542b062168c564d00c83097.dll windows:4 windows x86 arch:x86
735e4bbd51dda690446d9085eec0bcf1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
Sleep
LoadLibraryA
GetSystemDirectoryA
CreateThread
user32
SetWindowsHookExA
CallNextHookEx
msvcrt
strrchr
_stricmp
free
_initterm
malloc
_adjust_fdiv
_strcmpi
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ