ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
4a6bc66a99eca03fecec608ed314c3c5.dll
Resource
win7-20231129-en
General
-
Target
4a6bc66a99eca03fecec608ed314c3c5
-
Size
46KB
-
MD5
4a6bc66a99eca03fecec608ed314c3c5
-
SHA1
08616ddf7944c34e1350d679d348e6e47e736142
-
SHA256
c64516f617a91fc8929fca783db9fdff714686e3a371a4de4b47c3e60e9061a2
-
SHA512
b59dff4625686a7e4c1158084c990b3ec1f2b83695a172211afb093dc71b2735d5a72ac067db50231ebf5578fa5c0c92c308f6b57b39fc7f3583699dc8ca87ac
-
SSDEEP
768:rO+ipz8nuD+xQYAEHhRLkyFJomXmJ+DIR16zpIuHYQNkdWgYl/eSPKf8UNUhP/Ov:rO+s/iDzJomQ+cR169F4QNkdWr5eSPKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a6bc66a99eca03fecec608ed314c3c5
Files
-
4a6bc66a99eca03fecec608ed314c3c5.dll windows:4 windows x86 arch:x86
bb7a27a62efd78f80e29f733989cb707
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
IsWindow
gdi32
BitBlt
advapi32
LsaClose
shell32
SHGetSpecialFolderPathA
wininet
InternetCloseHandle
shlwapi
SHDeleteKeyA
msvcrt
calloc
winmm
waveInOpen
ws2_32
WSAStartup
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
imm32
ImmReleaseContext
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
psapi
EnumProcessModules
wtsapi32
WTSFreeMemory
Exports
Exports
Sections
.text Size: 39KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE