Exbcute
Static task
static1
Behavioral task
behavioral1
Sample
7134850dfe087ed0a4d0b64ecac63759.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7134850dfe087ed0a4d0b64ecac63759.dll
Resource
win10v2004-20231222-en
General
-
Target
7134850dfe087ed0a4d0b64ecac63759
-
Size
15KB
-
MD5
7134850dfe087ed0a4d0b64ecac63759
-
SHA1
771c22f71f43666c1af3b674069dc142cf04d11a
-
SHA256
3a0bfb58eef98d0e468e351c58bc93ca47e5964294e0f9c0c13198ff5edcf669
-
SHA512
6df2d5b501d95f074d2e4e0e58fab54dd2a95a5624557f9dc3080f4d11d64c9b05054ba8a5c824404de308a68735594751ece7d44c72aed589436f041dc90229
-
SSDEEP
192:qVMs/PoykLMPUZydy0x1U2OHefBegBp63nvSvdR2REvelaulBOn4chY0:B2PoykLMsSRx1VOHIB5BQ3bRvannHY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7134850dfe087ed0a4d0b64ecac63759
Files
-
7134850dfe087ed0a4d0b64ecac63759.dll windows:5 windows x86 arch:x86
f40ca41754be391b07ee1e39802d77ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
lstrlenA
WriteFile
GetProcAddress
CloseHandle
MoveFileExA
HeapFree
Process32First
GetTickCount
GetProcessHeap
Sleep
GetSystemDirectoryA
lstrcatA
FindFirstFileA
CopyFileA
GetTempFileNameA
LoadLibraryA
MoveFileA
FindNextFileA
GetModuleHandleA
Module32Next
lstrcpyA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
IsDebuggerPresent
user32
CopyIcon
LoadCursorA
wsprintfA
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 498B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ