Static task
static1
Behavioral task
behavioral1
Sample
5bc411c0ef8eb6f59ee45e0f062e9396.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5bc411c0ef8eb6f59ee45e0f062e9396.dll
Resource
win10v2004-20231215-en
General
-
Target
5bc411c0ef8eb6f59ee45e0f062e9396
-
Size
28KB
-
MD5
5bc411c0ef8eb6f59ee45e0f062e9396
-
SHA1
924e1bfebc8e25e82ce77387a4106dc4a58d20fe
-
SHA256
a81ab137ce934219c35344087a322844d32d86de054189b613d7034779627b71
-
SHA512
cf4e2de02cc539f2e58023cf4f8e015921ca36cb98fd8ecc73eb9dca6d4693bb6e78e69b7cba3b6903f109cf1946cf02228eb3dcaef92c953473ee6a2adebaeb
-
SSDEEP
768:bqKd7wjFk/KTSO0h4DisgP8c3u36fD799tD9M1Bx:WFoKmbsg0dYD799pgx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bc411c0ef8eb6f59ee45e0f062e9396
Files
-
5bc411c0ef8eb6f59ee45e0f062e9396.dll windows:4 windows x86 arch:x86
11a304d329e89340ab189ee83c3715fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
DeleteFileA
GetProcAddress
LeaveCriticalSection
LoadLibraryA
OpenMutexA
OpenProcess
ResumeThread
Sleep
TerminateThread
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WinExec
user32
BeginPaint
CheckMenuRadioItem
CheckRadioButton
CreateMenu
CreateWindowExA
DestroyCursor
DestroyWindow
EndPaint
ExitWindowsEx
FindWindowExA
GetCapture
GetCursorPos
GetDC
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
SetSysColors
SetTimer
SetWindowLongA
SetWindowPos
ValidateRect
WaitMessage
wvsprintfA
gdi32
CreateDIBSection
CreateRectRgn
CreateSolidBrush
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE