Static task
static1
Behavioral task
behavioral1
Sample
7aa17ccc544b8eeae554f129cb1e51d4.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7aa17ccc544b8eeae554f129cb1e51d4.dll
Resource
win10v2004-20231215-en
General
-
Target
7aa17ccc544b8eeae554f129cb1e51d4
-
Size
121KB
-
MD5
7aa17ccc544b8eeae554f129cb1e51d4
-
SHA1
fb3d62acdf601c512072d67e5c550cdeb4aa1692
-
SHA256
e55f2b7a2028d04fb558f0ef358f28be7703f8e2c4bd3ba74e219489b2764b75
-
SHA512
18a5543261e932d246aefe1021d711da04ca608380728a90e5bb345eab4534b57e811a966687ce5f3e06316e0d87331048e6beaff6f75c1691203b05119b5895
-
SSDEEP
3072:7QM8ueTeToz9p9YGN+h6yhqDQ1NHeIoHSrJrZwbjKDbulTLNJ6X:EMiew+hV+uVrZOiATLK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7aa17ccc544b8eeae554f129cb1e51d4
Files
-
7aa17ccc544b8eeae554f129cb1e51d4.dll windows:4 windows x86 arch:x86
bb63ab0f5cf695e2e95e60732ad6e1b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
GetModuleHandleA
lstrcpyW
lstrlenA
VirtualProtect
GetCurrentProcessId
lstrcpyA
lstrcpynA
lstrcatA
user32
wsprintfA
msvcrt
_onexit
__dllonexit
getc
putc
memchr
memcmp
strstr
memmove
memcpy
memset
strtoul
strlen
_EH_prolog
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
msvcp60
?_Xlen@std@@YAXXZ
?_Xran@std@@YAXXZ
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ