Static task
static1
Behavioral task
behavioral1
Sample
4510cc4c8a6547480d7a5fb544842897.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4510cc4c8a6547480d7a5fb544842897.dll
Resource
win10v2004-20231215-en
General
-
Target
4510cc4c8a6547480d7a5fb544842897
-
Size
256KB
-
MD5
4510cc4c8a6547480d7a5fb544842897
-
SHA1
7cfe7593390b45966d00dd5c4ea797a36138945f
-
SHA256
dbb79205bc2ff50a252a1db1b7083bd61c79c6398d9ce31d9d7292202bc39b09
-
SHA512
32657db837b63f70bf62b78542ca26ae0bb9ce48df2ebc6a07e2c324798f01c1f03ade62309ba496b785fedeccfefed696a055bc3b5cd6037576e8df4dcdd68f
-
SSDEEP
6144:nvqxkHXa2bWamTD2Lq+n7g+DDbejl9PCa:nvkk3aEWa22Rn7gSyl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4510cc4c8a6547480d7a5fb544842897
Files
-
4510cc4c8a6547480d7a5fb544842897.dll windows:4 windows x86 arch:x86
473e0fdcdd617231762254e2f8a0d331
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
InterlockedDecrement
SetVolumeLabelA
GetCommTimeouts
SetEndOfFile
lstrlenA
SetEvent
SetComputerNameExA
IsProcessorFeaturePresent
IsValidCodePage
GetLogicalDriveStringsA
LocalFlags
ReadConsoleA
CreateWaitableTimerA
QueryMemoryResourceNotification
HeapSize
MoveFileWithProgressA
IsValidLocale
GetFullPathNameA
GetDiskFreeSpaceExA
GetProcessHeaps
GetSystemWindowsDirectoryA
GetDiskFreeSpaceA
DefineDosDeviceA
SetConsoleScreenBufferSize
VirtualAlloc
GetStringTypeA
DeleteFileA
gdi32
SetViewportOrgEx
shell32
SHGetSpecialFolderPathA
winmm
timeBeginPeriod
timeGetTime
Sections
.idata Size: - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 244KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ