Static task
static1
Behavioral task
behavioral1
Sample
7edf551fed4d8d2afa77fd60fd7ed18d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7edf551fed4d8d2afa77fd60fd7ed18d.dll
Resource
win10v2004-20231215-en
General
-
Target
7edf551fed4d8d2afa77fd60fd7ed18d
-
Size
20KB
-
MD5
7edf551fed4d8d2afa77fd60fd7ed18d
-
SHA1
c96aadf07a98e3b973d95377c88471ad08efe520
-
SHA256
226e5425b9609f1f6b190a9e723cda243a72aacd3fd7d6d167dbf6a38ec8e21a
-
SHA512
cb72e603e500b5e3577b526dfe7208fd888a921a680e8261a411bade0c8937231e00a072f49adc19597b096abcfea31a1b8fc90ade490803e763653cd691159b
-
SSDEEP
384:gzRtmI8U2hnmgtGXwY3lHmPTC9qL2MlQjEHfa038:mP8rhnm1z1AQjE/l3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7edf551fed4d8d2afa77fd60fd7ed18d
Files
-
7edf551fed4d8d2afa77fd60fd7ed18d.dll windows:4 windows x86 arch:x86
6eabe88e994782ae9bddd34979aa4b01
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalAlloc
GetCurrentThread
GetProcAddress
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GlobalLock
LoadLibraryA
ReadProcessMemory
WriteProcessMemory
GetModuleHandleA
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
Sleep
GetModuleFileNameA
OpenMutexA
CreateMutexA
TerminateThread
CreateThread
GetCurrentProcess
GetCurrentProcessId
VirtualProtectEx
user32
ToUnicode
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetAsyncKeyState
FindWindowA
GetWindowThreadProcessId
GetKeyboardState
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
memset
wcslen
sscanf
??3@YAXPAX@Z
strlen
strrchr
strcmp
strcat
sprintf
strcpy
??2@YAPAXI@Z
strncpy
strstr
memcpy
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ