Static task
static1
Behavioral task
behavioral1
Sample
6641b45da1bcb93a7105d2bc11911387.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6641b45da1bcb93a7105d2bc11911387.dll
Resource
win10v2004-20231215-en
General
-
Target
6641b45da1bcb93a7105d2bc11911387
-
Size
52KB
-
MD5
6641b45da1bcb93a7105d2bc11911387
-
SHA1
f15b2e2f54ffc6620e7c5e714d24d17ca3334283
-
SHA256
d64caa9df37faf7faa9b4e1d31df0ed01e8ec1695ebb0eaa997e485d6a78aadd
-
SHA512
1d05519b28915acf6a421abb60ed980b8b45e98b17894c81d20425e8bfe2b2146497391c10ac99e2cf20a58ffadc51eb6927def36af7ab6a53033abe6adb8f03
-
SSDEEP
768:fvClxJ7UwcYT62WehQ79fEfTOGycUKf5/nxLSZWJMQioza:fmN7cRsfTdycUKBpCWJQoz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6641b45da1bcb93a7105d2bc11911387
Files
-
6641b45da1bcb93a7105d2bc11911387.dll windows:4 windows x86 arch:x86
b80589eb7a9058567f8b526b3326279b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
CompareStringA
WriteFile
CreateFileA
lstrcpynA
GetModuleFileNameA
lstrlenA
WinExec
lstrcmpA
ReadFile
Process32First
GetWindowsDirectoryA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
Sleep
OpenFile
TerminateProcess
OpenProcess
DeleteFileA
GetCurrentProcess
GetSystemDirectoryA
GetCurrentProcessId
CreateThread
CloseHandle
Module32First
Module32Next
Process32Next
OutputDebugStringA
LoadLibraryA
GetProcAddress
GetLastError
lstrcpyA
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
IsBadWritePtr
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ