Static task
static1
Behavioral task
behavioral1
Sample
565c216c279a7be21c511a6c58660baf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
565c216c279a7be21c511a6c58660baf.dll
Resource
win10v2004-20231215-en
General
-
Target
565c216c279a7be21c511a6c58660baf
-
Size
143KB
-
MD5
565c216c279a7be21c511a6c58660baf
-
SHA1
c3e4c2a7ec0555874b4f32aac1770467abe0db98
-
SHA256
dda82bcdb4090d506df27432338f915e2e82eb0bba24b3d75c38acbf7dc59bb5
-
SHA512
ed802c2d7d7d62835c61867945c75492c8015c6900df7444b49e4e18c99bdd6ead70784135fed0800a8270c1adac584e9d4367e2c686bdc2b881d081b6e5d3eb
-
SSDEEP
3072:yvU7RdtFBGYxaiG6aOJPzeWQXT9jnV2C1IZ5ye4vi:mkgP6N3QpjsAInye4v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 565c216c279a7be21c511a6c58660baf
Files
-
565c216c279a7be21c511a6c58660baf.dll windows:4 windows x86 arch:x86
0115a3f42493b96d094bf7810fe3a391
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvbvm60
__vbaCyAdd
__vbaCyI4
__vbaCyAbs
user32
wsprintfA
BeginPaint
ChangeMenuA
CharNextA
CharToOemBuffA
DispatchMessageA
EmptyClipboard
EnableMenuItem
MessageBeep
GetWindowTextA
kernel32
OpenFile
Sleep
VirtualAlloc
lstrcatA
GetStartupInfoA
dinput
DirectInputCreateW
ole32
DoDragDrop
OleSetClipboard
OleLockRunning
OleDuplicateData
CreateDataAdviseHolder
CreateBindCtx
CoTaskMemFree
CoRevokeClassObject
oleaut32
SafeArrayPutElement
SafeArraySetIID
VarCyFromStr
VarDecFromUI2
VarI4FromUI1
VarR8FromBool
VarUI2FromBool
VarUI2FromI2
VectorFromBstr
SafeArrayCopy
Sections
.text Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ