_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
55ce7997041645048a7b836ac64e186b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55ce7997041645048a7b836ac64e186b.dll
Resource
win10v2004-20231215-en
General
-
Target
55ce7997041645048a7b836ac64e186b
-
Size
21KB
-
MD5
55ce7997041645048a7b836ac64e186b
-
SHA1
cedb87d06216d076de03a8d48f4cbf7943fd423c
-
SHA256
f66f619fd824acce1f9f957214d5ff7868633a73e17fa3278441343438e903a8
-
SHA512
f23641ce16502737f7b0e1c54f047f8d8e807b74a9c94bbf669438c4c4f9d45f562996b303d466a463ca5b1413ff481411296e3c9492b8436af6dc42612b1804
-
SSDEEP
384:vW1Nl1XMI1+0QwC15xRheslwsA3PW5Igr2io9+:vW1NrP1+0ZC1VhesTA3Oviit
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55ce7997041645048a7b836ac64e186b
Files
-
55ce7997041645048a7b836ac64e186b.dll windows:4 windows x86 arch:x86
b43539810bcaa877b72832e74fb4bcbe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
SetEvent
WaitForSingleObject
CreateEventA
CreateMutexA
CreateThread
LoadLibraryA
GetModuleFileNameA
DisableThreadLibraryCalls
TerminateProcess
GetCurrentProcess
VirtualFree
VirtualProtect
VirtualAlloc
Process32Next
Sleep
CreateToolhelp32Snapshot
Module32Next
Module32First
VirtualQuery
GetSystemInfo
WinExec
WriteFile
CreateFileA
GetTempFileNameA
GetShortPathNameA
GetTempPathA
InterlockedPopEntrySList
InterlockedPushEntrySList
InitializeSListHead
FreeLibrary
ResetEvent
CloseHandle
ReleaseMutex
GetCurrentThread
SetThreadPriority
FreeLibraryAndExitThread
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
Process32First
user32
SetWindowsHookExA
UnhookWindowsHookEx
ShowWindow
UpdateWindow
CreateWindowExA
RegisterClassA
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
advapi32
RegDeleteValueA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegOpenKeyExA
LookupPrivilegeValueA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
DeleteUrlCacheEntry
InternetCloseHandle
InternetReadFile
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
urlmon
URLDownloadToFileA
ws2_32
closesocket
msvcrt
__CxxFrameHandler
_snprintf
_mbscmp
_mbsupr
_mbsnbcpy
_mbsstr
strlen
_ismbcprint
_memicmp
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
strcat
_ismbcspace
_mbsinc
memmove
sprintf
abs
memcmp
memset
_mbsicmp
_mbsrchr
memcpy
??2@YAPAXI@Z
_except_handler3
_local_unwind2
strcpy
Exports
Exports
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ