Static task
static1
Behavioral task
behavioral1
Sample
571d767d16279199d023b2146a1227db.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
571d767d16279199d023b2146a1227db.dll
Resource
win10v2004-20231215-en
General
-
Target
571d767d16279199d023b2146a1227db
-
Size
13KB
-
MD5
571d767d16279199d023b2146a1227db
-
SHA1
145a5417fab5fc50690944413450b23485d4ade7
-
SHA256
dc30920ee8d4d0d76f4ce040294384831b292c9979e3d5b08225ebc278123a11
-
SHA512
b704d22c3c2d02319a8c096c9c3943cb31b556beb930c3d2552256e70118869d6f2e688a2115dc5e2a5827858e770fef6dad8ca1f01ba2743926b2de915fc575
-
SSDEEP
192:RNBWmRow2EzVaCqx+jhfnqG0cp/57xi8eKX2Mqlh+dReejpYRSTV/:RN/ow2ZCq2fnqG37ee2Mqlhk59YRi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 571d767d16279199d023b2146a1227db
Files
-
571d767d16279199d023b2146a1227db.dll windows:4 windows x86 arch:x86
83d9d834b8f62e90d4165ebed03570b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateThread
CloseHandle
IsBadReadPtr
GetProcAddress
GetModuleHandleA
GetCurrentProcessId
RaiseException
ReadProcessMemory
WriteProcessMemory
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
VirtualProtectEx
GetModuleFileNameA
CreateThread
OpenMutexA
CreateMutexA
GetLocalTime
SetLocalTime
Sleep
user32
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
strcat
_stricmp
_adjust_fdiv
malloc
_initterm
free
memset
strrchr
strcpy
strlen
sprintf
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
sscanf
_strlwr
strncpy
strstr
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ