Static task
static1
Behavioral task
behavioral1
Sample
4b0c9b2423245ac22c7f47051d4f784f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b0c9b2423245ac22c7f47051d4f784f.dll
Resource
win10v2004-20231222-en
General
-
Target
4b0c9b2423245ac22c7f47051d4f784f
-
Size
44KB
-
MD5
4b0c9b2423245ac22c7f47051d4f784f
-
SHA1
26ad919d58eefa834ae2dc611a56dbb72ce90d57
-
SHA256
e1ae8fcbcb45ee4afc8995e7e6b792edd397fe73f45c1b21b58f63e09d735d76
-
SHA512
87c77a8ac57634ff9a9f29b7681d2fe5ca9b411d87d3a40449e31cd05381c9709dce7139afd00f7a8d2733fd08941a8543787d581f6c6a2e5317120fc24b2432
-
SSDEEP
768:cH1OPtKdlHVA/JxAM8NfCkR2cWotSDzxIPD6ark151:cH1/dexF6fCkRmzxnD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b0c9b2423245ac22c7f47051d4f784f
Files
-
4b0c9b2423245ac22c7f47051d4f784f.dll windows:4 windows x86 arch:x86
2c29fb6a780d05bc454732477a1bdf7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
DeleteFileA
ReadFile
GetCurrentProcessId
WriteFile
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WriteProcessMemory
CreateMutexA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
SetFilePointer
CreateThread
user32
FindWindowA
CallNextHookEx
GetWindowTextA
GetForegroundWindow
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExA
wininet
DeleteUrlCacheEntry
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
msvcrt
_initterm
malloc
_strupr
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
wcslen
strcmp
fopen
fread
fclose
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcat
atoi
sprintf
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ