Static task
static1
Behavioral task
behavioral1
Sample
76611b37b4918f6f9d61d1c58e5d70d0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
76611b37b4918f6f9d61d1c58e5d70d0.dll
Resource
win10v2004-20231222-en
General
-
Target
76611b37b4918f6f9d61d1c58e5d70d0
-
Size
28KB
-
MD5
76611b37b4918f6f9d61d1c58e5d70d0
-
SHA1
a70ea3d0fdf44ecdd3b050e8c7a55e627817300b
-
SHA256
c858318c1321d33c30459804048d5f7c8090866599f1258d1dabcb5ab8bdfe5e
-
SHA512
b69ae31540d24ab324f7a4bf6c02cb1db4e9588b5afc4ad71d40b379258f42b238df019808a6da63f1ade0439672a22171cd5a269936945b530fd5ff3241bc29
-
SSDEEP
384:EkQUZELXm3ezt8i8hxJKfPVEPfGYl79qvpn1cZyiTcJL:EkQUZELXm3ezCR6VEPfGY99Kpn19iAJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76611b37b4918f6f9d61d1c58e5d70d0
Files
-
76611b37b4918f6f9d61d1c58e5d70d0.dll windows:4 windows x86 arch:x86
367422b710007b2f0b336b9ae0406174
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
ws2_32
closesocket
ntohs
msvcrt
strchr
strcpy
_initterm
malloc
_adjust_fdiv
_itoa
strncpy
atoi
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
free
kernel32
GlobalAlloc
Sleep
lstrcmpA
lstrcpyA
CreateThread
GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcAddress
GetModuleFileNameA
GetTempPathA
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GlobalLock
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 866B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ