Static task
static1
Behavioral task
behavioral1
Sample
7a47deaa905a4d967255e9471cd328fd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a47deaa905a4d967255e9471cd328fd.dll
Resource
win10v2004-20231215-en
General
-
Target
7a47deaa905a4d967255e9471cd328fd
-
Size
15KB
-
MD5
7a47deaa905a4d967255e9471cd328fd
-
SHA1
b2f79b76e313eb5a92d264119092894f2bd02103
-
SHA256
479d73fdae1df76b801c83df0ed638d3863f19eaa52f8d2e24ae9fb4ea1d7576
-
SHA512
76376fcc1eace815c0b61bb9546cf6bf55100c937f86252070d4cf2024415bfbf69c54b5bf392ddc7e419206dcde2018246bf6ec83232f5bf43e4eb890f28036
-
SSDEEP
192:PXV1qE5/iGkVJNQ8awctaGGjoKZeG5BRsrFrFzdq+lI4BUEBm0aSsqD:nHB0nNQ8GHG34GgN5bqbSHD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a47deaa905a4d967255e9471cd328fd
Files
-
7a47deaa905a4d967255e9471cd328fd.dll windows:4 windows x86 arch:x86
b4d92698fdc2b733b7e7d0a8caf76db6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
LoadLibraryA
CreateToolhelp32Snapshot
Module32Next
Module32First
ReadFile
GetModuleFileNameA
ReleaseMutex
lstrcatA
WinExec
TerminateProcess
CreateThread
Sleep
GetCurrentProcess
Process32First
lstrcmpiA
Process32Next
lstrlenA
CreateFileA
WriteFile
CloseHandle
GetTempPathA
GetSystemDirectoryA
user32
OpenWindowStationA
wsprintfA
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shlwapi
StrStrA
StrStrIA
wininet
InternetCloseHandle
msvcrt
??3@YAXPAX@Z
atoi
strcpy
??2@YAPAXI@Z
strlen
memcpy
strcmp
strcat
sprintf
_purecall
isprint
strncat
memset
_itoa
Sections
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ