Static task
static1
Behavioral task
behavioral1
Sample
55a688b846a07a5bb1ff712bd5fd990e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55a688b846a07a5bb1ff712bd5fd990e.dll
Resource
win10v2004-20231215-en
General
-
Target
55a688b846a07a5bb1ff712bd5fd990e
-
Size
13KB
-
MD5
55a688b846a07a5bb1ff712bd5fd990e
-
SHA1
529a046559f5d64203d49217b24d87e4e7425478
-
SHA256
7f5a71d611f5a897558f8a3383feb6dee864e59509e550b60d40036a9c677659
-
SHA512
e02935daeb580f4060447945fcc9ce21eee12abc1d65ac4329d6663fa8b3de1aea7501e9050b80c58ecab0fa79422488e2c0e4f69e4d692b9a6c04512221b27c
-
SSDEEP
384:xJLU7agx8eJLWlIvBIqNtynBzSFeZFS1Vd:xJiaSLK2BIqHIzSFeaZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55a688b846a07a5bb1ff712bd5fd990e
Files
-
55a688b846a07a5bb1ff712bd5fd990e.dll windows:4 windows x86 arch:x86
d20d8ec0c7459eab21bdac914c22d486
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
kernel32
OpenProcess
GetStringTypeA
RtlUnwind
LCMapStringW
CloseHandle
CreateRemoteThread
CreateThread
ExitProcess
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
IsBadReadPtr
GetStringTypeW
ReadProcessMemory
RtlZeroMemory
Sleep
VirtualAllocEx
WriteProcessMemory
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
wininet
InternetOpenA
InternetOpenUrlA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 974B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ