Static task
static1
Behavioral task
behavioral1
Sample
4fe3b9cca54ed8589c1fc6f1e80c950c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fe3b9cca54ed8589c1fc6f1e80c950c.dll
Resource
win10v2004-20231215-en
General
-
Target
4fe3b9cca54ed8589c1fc6f1e80c950c
-
Size
19KB
-
MD5
4fe3b9cca54ed8589c1fc6f1e80c950c
-
SHA1
4946c8269613851b5f20feba777e8075e1c81423
-
SHA256
37a992069facc818b8aefe639ee07b45bf37c050c177d0110c0190e73520af30
-
SHA512
1c65e8ea8b2b5a4d99f1ec3ccdfea8cff0c2d857e7ea684fc9468f5e5c3fc808e6695b78f1237654add65492a4d35844774bfa9d095b63e431985a1a4e01874e
-
SSDEEP
384:FcnAIaJJ4eSp6oTT7V0LoQ+24xTL0Uo6dz:anAIYJPSDV08QGTL0Uo6dz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4fe3b9cca54ed8589c1fc6f1e80c950c
Files
-
4fe3b9cca54ed8589c1fc6f1e80c950c.dll windows:4 windows x86 arch:x86
4ede995e52f513871000736e99a7b62d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileStringA
Sleep
CreateThread
CloseHandle
CreateEventA
OpenEventA
GetCommandLineA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
GetFileSize
ReadFile
VirtualProtectEx
SetThreadPriority
IsBadReadPtr
GlobalUnlock
VirtualAlloc
VirtualFree
GlobalAlloc
GlobalLock
ReadProcessMemory
GlobalFree
GetProcAddress
GetModuleFileNameA
user32
UnhookWindowsHookEx
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetInputState
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ