Static task
static1
Behavioral task
behavioral1
Sample
68396ae08e24d9af5a02aae3a8dd8351.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68396ae08e24d9af5a02aae3a8dd8351.dll
Resource
win10v2004-20231222-en
General
-
Target
68396ae08e24d9af5a02aae3a8dd8351
-
Size
28KB
-
MD5
68396ae08e24d9af5a02aae3a8dd8351
-
SHA1
49f29a3ed85818701a80ab40ce25cb7607308ff1
-
SHA256
5eabc977e62799fcd13128e6ee8c05d3a0bb38b3569e7ec53ca7601ebf9bd3b7
-
SHA512
ee4ffe20611290cd5577b4dc0bc91f9e574a095a0b1230be907e1229a16dc74bbcadd4ede517788f253117cf49b1d5c1cd6b51235c5011fdc37046cf5620e1a5
-
SSDEEP
768:cq3dpEH4ojMad4pcv7T8UtRW2qLuX2vXPp3Z:FdpeL4KvX8129X2v/p3Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68396ae08e24d9af5a02aae3a8dd8351
Files
-
68396ae08e24d9af5a02aae3a8dd8351.dll windows:4 windows x86 arch:x86
39028b0f87f31c8b1693091d0feb464d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
GetCommandLineA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrcpyn
lstrlen
MultiByteToWideChar
SetFilePointer
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
user32
GetWindowDC
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
gdi32
CombineRgn
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
SetStretchBltMode
SetTextColor
SetWindowOrgEx
StretchBlt
TextOutA
shell32
DllRegisterServer
DragQueryFile
DragQueryPoint
Shell_NotifyIcon
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ