Static task
static1
Behavioral task
behavioral1
Sample
4eea1e120beda543f95ef3a9bc4a0b32.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4eea1e120beda543f95ef3a9bc4a0b32.dll
Resource
win10v2004-20231222-en
General
-
Target
4eea1e120beda543f95ef3a9bc4a0b32
-
Size
260KB
-
MD5
4eea1e120beda543f95ef3a9bc4a0b32
-
SHA1
781f6c7679061c49e8b887117233fd53445e4fa7
-
SHA256
3003234f7511682fd501c4a0c4b7d41915149fdb455d0743602774054db30a25
-
SHA512
92fbb0c596cfe2b806611ed9dc27a0ce559f10af77cb39486f7fef9a047541764cf349596fa6dc4a8b9a0e4173b630368fcea7a125fb330a0582bff0236c36e5
-
SSDEEP
3072:BzBKLE7G6Qn9mBGf6BO79FZZiNqEmiqU9fVKLxwsAmoEXcEJ5atLOYCye5tXGkr:d2Mg4YyYiFcmstty6Y0LBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4eea1e120beda543f95ef3a9bc4a0b32
Files
-
4eea1e120beda543f95ef3a9bc4a0b32.dll windows:4 windows x86 arch:x86
784c8fff4a7ce4882c5b2122122228a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
CreateFileW
GetLastError
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesW
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
LoadLibraryW
GetProcAddress
FindClose
ReadFile
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ