A
Static task
static1
Behavioral task
behavioral1
Sample
89c23e756871050c7fed216d9cf7565c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89c23e756871050c7fed216d9cf7565c.dll
Resource
win10v2004-20231222-en
General
-
Target
89c23e756871050c7fed216d9cf7565c
-
Size
5KB
-
MD5
89c23e756871050c7fed216d9cf7565c
-
SHA1
256445afec65d078939ad3975ea6dd716bdef7df
-
SHA256
602ee0453b15e3a060b3bc2f303434a2edcb89b0df62784b7546dc1b1929b369
-
SHA512
ce33bc70f1c140e41dd7b116885bc94be9e8cc863a598bf806fe1e3a5d5a207a1863d6db60a539c1ed39ae107ec73b1ac900d93262074228dd62be253e55d91d
-
SSDEEP
96:Z1Rni5dUxxGYcxwC+KB7XkKIkK58KEMM6:9i5dUxUFZzIDz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89c23e756871050c7fed216d9cf7565c
Files
-
89c23e756871050c7fed216d9cf7565c.dll windows:1 windows x86 arch:x86
b62660cd15f66fa5d7b8ee4d3ea7279c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
GetModuleHandleA
CreateThread
Sleep
lstrlenW
ReadProcessMemory
lstrlenA
GetProcAddress
user32
CallNextHookEx
SetWindowsHookExA
Exports
Exports
Sections
.ata Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ