Static task
static1
Behavioral task
behavioral1
Sample
97dec621b684ef471ea0f1117ca8214a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97dec621b684ef471ea0f1117ca8214a.dll
Resource
win10v2004-20231222-en
General
-
Target
97dec621b684ef471ea0f1117ca8214a
-
Size
28KB
-
MD5
97dec621b684ef471ea0f1117ca8214a
-
SHA1
36d5a693726c641bdec1d28210524c2a34fc5ecd
-
SHA256
2245df1b676f07514adceae7828f3b835ee3558fb2481ba5a60b3eb31f7a2b5f
-
SHA512
fd1611df19eebec18ff5aac6120cb8b28656f2da50027146621449aa5bb620a065dad82b699220e0b2e8a169e7b12be58db5ef3a9bdf7bec7751dc8b28a15905
-
SSDEEP
192:sHKZjxsflA4hkzE/kJFI3kijdizgNwJh8TTbD1TusL+howZdtaI2LMqrM36TQeUF:sHG0lT/gFDGvD1B270U3EK5+K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97dec621b684ef471ea0f1117ca8214a
Files
-
97dec621b684ef471ea0f1117ca8214a.dll windows:4 windows x86 arch:x86
45a3c78974c6850dee1da2fef9326321
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
MapVirtualKeyA
ToAscii
msvcrt
_itoa
_adjust_fdiv
malloc
_initterm
free
strchr
strcmp
atoi
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
kernel32
WriteProcessMemory
Sleep
InitializeCriticalSection
CreateThread
LoadLibraryA
CopyFileA
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
GetProcAddress
EnterCriticalSection
lstrcmpA
lstrcpyA
LeaveCriticalSection
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
TerminateProcess
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ