Static task
static1
Behavioral task
behavioral1
Sample
51e3a423e9250dfd776f3809efa202f7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51e3a423e9250dfd776f3809efa202f7.dll
Resource
win10v2004-20231222-en
General
-
Target
51e3a423e9250dfd776f3809efa202f7
-
Size
28KB
-
MD5
51e3a423e9250dfd776f3809efa202f7
-
SHA1
1c1922f6b071755de5733ecb9ce4b30f11553077
-
SHA256
59f04e2efb60cee2875f3ce59e9b3fc80c2c50ce937fe1bc200eff3cb8a79aaf
-
SHA512
47a71223adcb4878916026bd4cac79d9861576b17194db0f76f81c6763d5c4f3c183fc777a8a2e87ff76f238db25b09dc61beb221d35b7867f15e35c42a93028
-
SSDEEP
192:sGjJLxius6x2zAPdyXfEQBu42qQxuBBQ6PRQkTQ8Rs1Pm:/+usSi1BhYuBBQARQkTds1Pm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51e3a423e9250dfd776f3809efa202f7
Files
-
51e3a423e9250dfd776f3809efa202f7.dll windows:4 windows x86 arch:x86
f23f2946fe492af6786715eb1de66ebb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalFree
ReadFile
ReadProcessMemory
RtlZeroMemory
Sleep
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQueryEx
WaitForSingleObject
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetProcAddress
LoadLibraryA
user32
GetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
SetTimer
SetWindowLongA
CallWindowProcA
KillTimer
wsprintfA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
msvcrt
memcmp
memcpy
ws2_32
send
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ