Static task
static1
Behavioral task
behavioral1
Sample
4dd745ab1cf6372b001d7b75c9dbb535.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4dd745ab1cf6372b001d7b75c9dbb535.dll
Resource
win10v2004-20231215-en
General
-
Target
4dd745ab1cf6372b001d7b75c9dbb535
-
Size
33KB
-
MD5
4dd745ab1cf6372b001d7b75c9dbb535
-
SHA1
a2694ad70399148019a05121d51286176c98fdda
-
SHA256
400d405428017f268542917bccbccff659006d23ca025729d1a91896f8bffccb
-
SHA512
db811007325b67e49b130de16553299aab87430f631b5f9c97233cd28999e7a8b4c75c4e106702a81cd3d1323c6b14cba10cf3eb17470d0c61def6e4109faee7
-
SSDEEP
768:4tK1CFFLjYq8Ob+DWDbR8KGBIBh15sCh//Qbr68+5f:sK8RgOEEb+RBg9/S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd745ab1cf6372b001d7b75c9dbb535
Files
-
4dd745ab1cf6372b001d7b75c9dbb535.dll windows:4 windows x86 arch:x86
36d620220a49d8d743d44d5906fd1e00
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
LoadLibraryA
GlobalLock
GlobalAlloc
ExitProcess
InitializeCriticalSection
GetModuleHandleA
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
ReadProcessMemory
GetCommandLineA
VirtualAllocEx
OpenProcess
lstrlenA
GetModuleFileNameA
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
VirtualAlloc
GetTempPathA
CreateFileA
ReadFile
CloseHandle
GetLocalTime
DeleteFileA
Sleep
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
CreateRemoteThread
GetLastError
user32
GetKeyboardState
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
GetWindowThreadProcessId
FindWindowA
ToUnicode
wininet
InternetCloseHandle
InternetReadFile
msvcrt
free
_initterm
malloc
_adjust_fdiv
_strnicmp
_stricmp
_strupr
_strlwr
strchr
??3@YAXPAX@Z
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
wcslen
fclose
fread
fopen
strrchr
atoi
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ