Static task
static1
Behavioral task
behavioral1
Sample
46f887daab9038c2f698ba88765a1476.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46f887daab9038c2f698ba88765a1476.dll
Resource
win10v2004-20231215-en
General
-
Target
46f887daab9038c2f698ba88765a1476
-
Size
28KB
-
MD5
46f887daab9038c2f698ba88765a1476
-
SHA1
b45c278170ba5e2ed40bc0dff92f75471b3a830a
-
SHA256
7c3c9768611074c84ed242b8b5f4c22781e400dc1f7bfeb938e48587b94d675d
-
SHA512
c3e79432174fb3bf5f52e678a0254c2eaf1beff17e1b1433578ab205d87a607cff26c28b700f3d89e7a9074887a009335897560de7e42a0e6b26d156e4d112b9
-
SSDEEP
192:FzxGfov7RA4hNozWQrgZnl99MKF+xagyVnBw7v906SJaNWo+KSPK:FzxGe7RoXUnl9V+xagE6p0TAJ+/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46f887daab9038c2f698ba88765a1476
Files
-
46f887daab9038c2f698ba88765a1476.dll windows:4 windows x86 arch:x86
45a3c78974c6850dee1da2fef9326321
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
MapVirtualKeyA
ToAscii
msvcrt
_itoa
_adjust_fdiv
malloc
_initterm
free
strchr
strcmp
atoi
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
kernel32
WriteProcessMemory
Sleep
InitializeCriticalSection
CreateThread
LoadLibraryA
CopyFileA
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
GetProcAddress
EnterCriticalSection
lstrcmpA
lstrcpyA
LeaveCriticalSection
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
TerminateProcess
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 742B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ