Static task
static1
Behavioral task
behavioral1
Sample
517681b127641137380a4b56aa086780.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
517681b127641137380a4b56aa086780.dll
Resource
win10v2004-20231222-en
General
-
Target
517681b127641137380a4b56aa086780
-
Size
28KB
-
MD5
517681b127641137380a4b56aa086780
-
SHA1
6f3a8e03ede0c858e83e8f61329b0c0cec4b0fc0
-
SHA256
c53e60f29083bb9c456f068d4c638af2b3653c47e2617eb384b87911059d3f03
-
SHA512
64a8906b6961035937f94ddfba165f55aebb236fa7faa1d7fa39a6df6be92fb8531657d0b56696dd67f246b72c4e5c1b600020c37048b238dd7bc41a059fcdc9
-
SSDEEP
192:pOw3dPHl9sjXKLFA4hSgygQxPM4DW3lQLoYqzV2uHzB2tLSYCaLCaMBsoI:pbPEjX6YgyRPMZ1QsdzQuTB6S4LCVSN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 517681b127641137380a4b56aa086780
Files
-
517681b127641137380a4b56aa086780.dll windows:4 windows x86 arch:x86
cff0d52ffc308b6797bfd204ba5ebde6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
strcat
strlen
atoi
memcpy
strstr
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
_strlwr
kernel32
GetCurrentProcess
TerminateProcess
lstrcpyA
CreateThread
GetModuleHandleA
Sleep
LoadLibraryA
GetTempPathA
CopyFileA
GetProcAddress
GetModuleFileNameA
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
WriteProcessMemory
VirtualProtectEx
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ