Static task
static1
Behavioral task
behavioral1
Sample
895d048fbd5894701f0bfe3b41ed10ea.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
895d048fbd5894701f0bfe3b41ed10ea.dll
Resource
win10v2004-20231215-en
General
-
Target
895d048fbd5894701f0bfe3b41ed10ea
-
Size
32KB
-
MD5
895d048fbd5894701f0bfe3b41ed10ea
-
SHA1
10812d73b3168741f794bf447bbf040036741ace
-
SHA256
bcbcc4bbea6baa368045fc10d897f2a8eea111c5550415eed881c77126a2ea68
-
SHA512
8e6fcc352146cb4192cb04a91f8046483d13e508cac9fabe09ce5397da85f68b2607b72b156805fd56406cf3069564aa7e48cf2827f873ee86645a0f5aacffc6
-
SSDEEP
384:ZZq2YxmSXSBTDjDCfzwPaPcdPHfZQp2QEaXcN/s:MmSXKTXKwPaPcdPxdaMZs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 895d048fbd5894701f0bfe3b41ed10ea
Files
-
895d048fbd5894701f0bfe3b41ed10ea.dll windows:4 windows x86 arch:x86
9a583d2bedfd74b2564d4d75c083417d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
closesocket
ntohs
msvcrt
_adjust_fdiv
_itoa
malloc
_initterm
free
memcmp
strchr
atoi
memcpy
strncat
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
strstr
fopen
fwrite
fclose
fread
time
_strlwr
kernel32
WinExec
GetFileAttributesA
GetModuleHandleA
CreateThread
lstrlenA
CopyFileA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetTempPathA
lstrcpyA
OutputDebugStringA
CreateProcessA
Sleep
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
TerminateProcess
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ