Static task
static1
Behavioral task
behavioral1
Sample
49891c50382258ed5d6bc3157f0f3fb1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49891c50382258ed5d6bc3157f0f3fb1.dll
Resource
win10v2004-20231222-en
General
-
Target
49891c50382258ed5d6bc3157f0f3fb1
-
Size
36KB
-
MD5
49891c50382258ed5d6bc3157f0f3fb1
-
SHA1
3f05ec9a1b671407f71c97e04a5ccf8d7d4d33f1
-
SHA256
659154bbc1cf41716859ea6cee657276f65991dd2413ad859157493c521ae593
-
SHA512
c7e2a0596c52558a37341b416e6e2f9556826c8e17e04e9d5463bd3e33ec1b368352e2bdb6c1cffffb4eaba59419f8e5adc3d2098b566f9444491916c7ccda14
-
SSDEEP
384:GYopeQ9rHfPTjN9og2X3fG8u6gy7/Ku9u6kBmw+6uBBQARQk+oGtd1m4ur:GY1wv8rX3fRgml+mwKBBQARQk+ntddu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49891c50382258ed5d6bc3157f0f3fb1
Files
-
49891c50382258ed5d6bc3157f0f3fb1.dll windows:4 windows x86 arch:x86
f7d9a1d0792f9c7158202c2e55a28c0d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
strstr
RtlZeroMemory
RtlUnwind
memcpy
memcmp
strlen
ws2_32
closesocket
gethostname
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
GetLastError
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
MapViewOfFile
MoveFileExA
ReadFile
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WideCharToMultiByte
WriteFile
lstrcpynA
IsBadReadPtr
LoadLibraryA
user32
wsprintfA
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
PostMessageA
CallNextHookEx
FindWindowA
KillTimer
RegisterWindowMessageA
SendMessageA
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ