SK
Static task
static1
Behavioral task
behavioral1
Sample
8886c83f637a10739e1fe8c748aa51fe.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8886c83f637a10739e1fe8c748aa51fe.dll
Resource
win10v2004-20231215-en
General
-
Target
8886c83f637a10739e1fe8c748aa51fe
-
Size
24KB
-
MD5
8886c83f637a10739e1fe8c748aa51fe
-
SHA1
bad2f462512b18be101b0347dabe061de0b0bcac
-
SHA256
366d98f42e235cae6ae157263d772a7efc345b8bb488e55a0feba915068f7142
-
SHA512
e31a3a7a45ba10d84f4442043255eb85cfb081d1e4e54a770f2f6dea5d0fab967b372c4bd3cd18439ae0636ac8866dd62c61531074172f6a5e3520999a0fa7fe
-
SSDEEP
96:59A621gsnz3LM7IItelu7BjP0tVeGF02N7xMp5eTjf8B:59r9e2WeGC2N0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8886c83f637a10739e1fe8c748aa51fe
Files
-
8886c83f637a10739e1fe8c748aa51fe.dll windows:4 windows x86 arch:x86
d06475adc2712d9786fc6db6353a5661
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetProfileIntA
lstrcatA
GetCurrentProcessId
GetLocalTime
lstrcpyA
GetCurrentThreadId
user32
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
SetWindowsHookExA
CallNextHookEx
GetKeyboardState
GetActiveWindow
wsprintfA
GetWindowTextA
ToAscii
msvcrt
_adjust_fdiv
malloc
_initterm
free
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 266B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ