Static task
static1
Behavioral task
behavioral1
Sample
414f4bd3973b03cd3fafe7d77caa7d3c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
414f4bd3973b03cd3fafe7d77caa7d3c.dll
Resource
win10v2004-20231215-en
General
-
Target
414f4bd3973b03cd3fafe7d77caa7d3c
-
Size
9KB
-
MD5
414f4bd3973b03cd3fafe7d77caa7d3c
-
SHA1
8c04af3a0b23613fcec065562e98ede278fd990a
-
SHA256
15cd2f17fa75bb50e6dca9e6db94c46acd361a5906e3dac3fe96393f8162440b
-
SHA512
195eaf611f4ea11fb03d489f6df5c01d2e1bfa2b57ad1b6068067ee0c1f763826fdc82f0f7496accbb97f6a16489ae78b6c553dace3a1385a7703b4566ae913a
-
SSDEEP
192:5KhCVXgalf2uZVkKO2MdQ/1GDKpFeu/fLAbNi:59VXflEKO2MdQ/1G+3eUfLAbN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 414f4bd3973b03cd3fafe7d77caa7d3c
Files
-
414f4bd3973b03cd3fafe7d77caa7d3c.dll windows:4 windows x86 arch:x86
e18ad4276a84dca254b95f8c178eb072
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
IsBadReadPtr
GetCommandLineA
ReadProcessMemory
WriteProcessMemory
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
VirtualProtectEx
GetCurrentProcessId
OpenMutexA
CreateMutexA
Sleep
GetModuleFileNameA
CreateThread
GetLocalTime
SetLocalTime
user32
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
sscanf
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
strcpy
memcpy
strncpy
strchr
sprintf
??2@YAPAXI@Z
strlen
??3@YAXPAX@Z
_strlwr
strcat
strstr
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ