Static task
static1
Behavioral task
behavioral1
Sample
641340c30d79609bdd5813bbce05d668.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641340c30d79609bdd5813bbce05d668.dll
Resource
win10v2004-20231215-en
General
-
Target
641340c30d79609bdd5813bbce05d668
-
Size
28KB
-
MD5
641340c30d79609bdd5813bbce05d668
-
SHA1
2b761372acba536ec63446d40383886a9d381ac1
-
SHA256
79ef1f3bdad62b373e028663689d982b32f498d64f2a3d3e578c08375a17c195
-
SHA512
8b2f5676b596a589d9a32ee688a42a55dd3337616a3c90393b66733642af19f1393a4bd8dc567ad8be093001c1d7774ec5ece32c6fcefb3ad9e9ee5712f0dc67
-
SSDEEP
768:2BlPPGK7t6jpEOvSn9iY+d0naBBQARQkefVR:ouYt6jpE/PaBBQARs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 641340c30d79609bdd5813bbce05d668
Files
-
641340c30d79609bdd5813bbce05d668.dll windows:4 windows x86 arch:x86
5bcab95e4031de9111fc1074859ada91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
closesocket
gethostname
ntdll
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
kernel32
UnmapViewOfFile
VirtualProtectEx
MapViewOfFile
CreateFileMappingA
lstrcmpA
OutputDebugStringA
lstrcpynA
TerminateThread
Sleep
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
IsBadReadPtr
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
CreateThread
user32
SetWindowsHookExA
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
UnhookWindowsHookEx
FindWindowA
CallNextHookEx
SetTimer
wsprintfA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ