Static task
static1
Behavioral task
behavioral1
Sample
8dcb564711b02de4f12550d5208f5b03.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8dcb564711b02de4f12550d5208f5b03.dll
Resource
win10v2004-20231215-en
General
-
Target
8dcb564711b02de4f12550d5208f5b03
-
Size
20KB
-
MD5
8dcb564711b02de4f12550d5208f5b03
-
SHA1
a23a8405cd790c2d3b8e5e2fa2bb57cedecd6490
-
SHA256
d1aa6bcb9320c54d209c5ad370bfd85d4565fe44c5ee01dd80a07e8656218516
-
SHA512
972531e500b226a2feb8d9dc4670072db27e9d627f7b14eed664429e2d119cce5fc0b0926bfa11b05c3735abb61fa0b1e11a157af700b0f6ab82a9aa399ab01d
-
SSDEEP
384:fgaC09C4BqM903Ssi6E/n+YD9KfVQEvDwCn2XOq+ceOyl4m9V:f7CSnYSskn+YhudvDC/8OzYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dcb564711b02de4f12550d5208f5b03
Files
-
8dcb564711b02de4f12550d5208f5b03.dll windows:4 windows x86 arch:x86
0ebcb3ccf77afb25d565806b92ed0ec2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetPrivateProfileStringA
IsBadReadPtr
ExitProcess
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
TerminateProcess
InitializeCriticalSection
VirtualProtect
GlobalFree
GetModuleHandleA
WideCharToMultiByte
LoadLibraryA
ReadProcessMemory
SetThreadContext
SetUnhandledExceptionFilter
WriteProcessMemory
Sleep
SetThreadPriority
WaitForSingleObject
CloseHandle
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
GetModuleFileNameA
CreateThread
TerminateThread
GetCurrentProcessId
CreateMutexA
GetProcAddress
GetLastError
user32
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
_stricmp
malloc
_adjust_fdiv
_strlwr
fopen
fread
fclose
strstr
strcat
sprintf
strcpy
memcpy
strrchr
memset
strlen
??2@YAPAXI@Z
strcmp
wcslen
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ