fhekplng
Static task
static1
Behavioral task
behavioral1
Sample
8e2e3e2533360a8db923949086985455.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e2e3e2533360a8db923949086985455.dll
Resource
win10v2004-20231215-en
General
-
Target
8e2e3e2533360a8db923949086985455
-
Size
584KB
-
MD5
8e2e3e2533360a8db923949086985455
-
SHA1
6c85754d2d141deb5c2ae46911588f83a18c98ef
-
SHA256
b91da05ada1f6b59f8179b84fe32cabdbc00992173fa12748aef33c28ac40018
-
SHA512
cb77d1e66c6acfb71f47aad8b957a03cc166ac5bd4c53b63b6996c8cda45b9025594f417510fcd85227c912e12ed19b7ff3f79e5c6ae6c88ef73f1a231c73678
-
SSDEEP
6144:UWx6kHYssEqcdu/AoRsrz/levwGHXpSd1KZ3pjGQOH5IjfEf78+3GF:J4sslcduTmdeIGH5Sd1KHKdZGfw77GF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e2e3e2533360a8db923949086985455
Files
-
8e2e3e2533360a8db923949086985455.dll windows:4 windows x86 arch:x86
28b608b28986391b1a5fcb5a69d0c666
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
FileTimeToLocalFileTime
WriteFile
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
ReadDirectoryChangesW
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
ReadFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 552KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ