Static task
static1
Behavioral task
behavioral1
Sample
488e3b6c8ffe3757ff238b2a01bbff2b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
488e3b6c8ffe3757ff238b2a01bbff2b.dll
Resource
win10v2004-20231215-en
General
-
Target
488e3b6c8ffe3757ff238b2a01bbff2b
-
Size
24KB
-
MD5
488e3b6c8ffe3757ff238b2a01bbff2b
-
SHA1
3e4c0c02305e135dd27f93139ff292524928934b
-
SHA256
89b083ee018fb81b07c2778fbba798b436d95ac3de93c44aa5d3bb91449c0c8d
-
SHA512
540961f112dbe5fb3dfddb32438a4f4888318cfefe828444168ed710c834aba42a3df5fadb8f2534bdae9606639fd52c364bf6632cc4ff43e270ac71c88067ec
-
SSDEEP
384:7mAw3nGbmvHLv4gaLRMkTYXJeYG8Rpct5z0C:7OnGbmv76LuCYXJ9G8Rat5R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 488e3b6c8ffe3757ff238b2a01bbff2b
Files
-
488e3b6c8ffe3757ff238b2a01bbff2b.dll windows:4 windows x86 arch:x86
97203822b5490304f4173c5641f883b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowTextA
FindWindowExA
FindWindowA
EnumChildWindows
EnableWindow
ws2_32
ntohs
closesocket
msvcrt
free
_initterm
malloc
_adjust_fdiv
_itoa
strcmp
atoi
strcpy
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
rand
fopen
fwrite
fclose
fread
time
memset
_strlwr
srand
kernel32
IsBadReadPtr
GetModuleFileNameA
GetModuleHandleA
GetTickCount
lstrlenA
CopyFileA
CreateThread
GetTempPathA
LoadLibraryA
GetProcAddress
VirtualAllocEx
GlobalAlloc
GlobalLock
CreateRemoteThread
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
Sleep
lstrcmpA
lstrcpyA
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 780B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ