Static task
static1
Behavioral task
behavioral1
Sample
5a0c11c22e24358afaa50b876bb4de33.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a0c11c22e24358afaa50b876bb4de33.dll
Resource
win10v2004-20231215-en
General
-
Target
5a0c11c22e24358afaa50b876bb4de33
-
Size
27KB
-
MD5
5a0c11c22e24358afaa50b876bb4de33
-
SHA1
6a676bcdb1c0dc9e63c1aa1a9444f52b3d2d5c16
-
SHA256
e003fcbf49129b39f1a1749a4d6077e2d0c576f5cfd18e86913f47bc5e9117a1
-
SHA512
8e8f0d88177ae68a1084ca7976a609638d2c16e81e5cae4672295b05033160e9ebdd3349cb9591f2180d5c76a1c26830198e09a18a3fd6bba4a6a911a236c374
-
SSDEEP
768:ORyjTuxs+Snm9dB0e/l5qNiDDgpz2JH3o9EZ:ORyjTeCidBAN0DTHY9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a0c11c22e24358afaa50b876bb4de33
Files
-
5a0c11c22e24358afaa50b876bb4de33.dll windows:4 windows x86 arch:x86
92bfef888968da4f759215a205f21892
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
GetSystemDirectoryA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
WriteFile
GetModuleFileNameA
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
WriteProcessMemory
CreateFileA
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
DeleteFileA
CreateThread
user32
SetWindowsHookExA
GetWindowTextA
CallNextHookEx
UnhookWindowsHookEx
FindWindowA
GetWindowThreadProcessId
GetForegroundWindow
wininet
InternetCloseHandle
InternetReadFile
msvcrt
_initterm
malloc
_adjust_fdiv
_strupr
_stricmp
_strlwr
_strcmpi
free
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
atoi
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
strcmp
wcslen
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ