accesopd
Static task
static1
Behavioral task
behavioral1
Sample
7a49a4d16c94f0aac9013c002f788d3e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a49a4d16c94f0aac9013c002f788d3e.dll
Resource
win10v2004-20231215-en
General
-
Target
7a49a4d16c94f0aac9013c002f788d3e
-
Size
51KB
-
MD5
7a49a4d16c94f0aac9013c002f788d3e
-
SHA1
95de231d9997c70f9c439cb1a2f1799ceba45f70
-
SHA256
35ff5f1d3fbb67a42b78649394964a043fb7d8c409f73ba7d79cdddcdf8eda35
-
SHA512
ec39a8c417ee586e025bf1f35c70cf6aec53839c1a17eda06bcd2b24906c7a803792dfd7eec2aeafc5da32ecb2e3f78a04caf1d64c93c533a1667d6021283f26
-
SSDEEP
768:P6L3Igr7bPAtcbvCXwXHiTEmKertauKx7I6HzoAsTO/M6V:PCtTLVHiTEmKwtMoBTaMs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a49a4d16c94f0aac9013c002f788d3e
Files
-
7a49a4d16c94f0aac9013c002f788d3e.dll windows:4 windows x86 arch:x86
a0978febdb64ed45f2172393d751a126
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadFile
SetFilePointer
GetFileSize
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
DeleteFileA
WaitForSingleObject
GetVersion
GetWindowsDirectoryA
GetTempFileNameA
GetTempPathA
OpenProcess
GetCurrentProcess
TerminateProcess
FileTimeToLocalFileTime
FindClose
GetLastError
FindNextFileA
FindFirstFileA
GetCurrentDirectoryA
GetDiskFreeSpaceA
lstrcmpA
GetDriveTypeA
lstrcpynA
lstrlenA
SetCurrentDirectoryA
Sleep
CreateThread
CreateEventA
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
TlsGetValue
lstrcpyA
lstrcatA
CreateProcessA
GetLogicalDriveStringsA
CloseHandle
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
user32
wsprintfA
shlwapi
StrRChrA
StrStrA
StrToIntA
ws2_32
inet_addr
gethostbyname
htons
WSAStartup
WSACleanup
setsockopt
recv
send
WSAGetLastError
socket
closesocket
inet_ntoa
gethostname
connect
shutdown
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ