Static task
static1
Behavioral task
behavioral1
Sample
7672ac746f3a36e7f544a66419cb590f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7672ac746f3a36e7f544a66419cb590f.dll
Resource
win10v2004-20231215-en
General
-
Target
7672ac746f3a36e7f544a66419cb590f
-
Size
60KB
-
MD5
7672ac746f3a36e7f544a66419cb590f
-
SHA1
8e6e08ed5bdd13205b9924ba1766e18d401a557e
-
SHA256
94e73cc4b8a07996f46b5e543be332b8fb6bf4c22e92fb00c65b5783a3df0b3a
-
SHA512
b5c424d3d7964381a141e06102e53beeafc32d19831f84d78babb85a26220bbcd6424c301cc40ab64d213d8549ff8c0af9a76cfd489170528b10e1ad5a95e9f8
-
SSDEEP
768:C4EKuMyo6OkPt+IcnvOKQmgIlOUvBP285TpSInyG7VOXzc7SUoynAM9OW2/Gt8D5:CYyoA+IQT4Uh285lXyZcrAetqzZQ2T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7672ac746f3a36e7f544a66419cb590f
Files
-
7672ac746f3a36e7f544a66419cb590f.dll windows:4 windows x86 arch:x86
dbb268a858c1392d055274ded7894cf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
HeapValidate
IsValidLanguageGroup
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 494B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ