jedj
Static task
static1
Behavioral task
behavioral1
Sample
985b7a641da9ab22b4f4a47c6f8b92bb.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
985b7a641da9ab22b4f4a47c6f8b92bb.dll
Resource
win10v2004-20231222-en
General
-
Target
985b7a641da9ab22b4f4a47c6f8b92bb
-
Size
576KB
-
MD5
985b7a641da9ab22b4f4a47c6f8b92bb
-
SHA1
ca8b7d60f04bace9c5d3cb1db6b4e2ba5057ec2e
-
SHA256
7eed0c964a749a5037e64269b36b2596f5fb0958b1adb356a1e58f768978eff5
-
SHA512
12e446889e9111587ec9a39c3df2c48e265170ee454386796b4baee938d0686e06740dcdb554c9918891437d60068a17643e8ff75060228ba3e1e662a4e94654
-
SSDEEP
6144:bb/ZV76lA4txK3w4mYWe4F+g/WEa6k51Tn7bn8Zs1Or/mgwkD8JW1nNGQ89KnQcD:bLZE3x2wDph9OZ6kT8ZMqugwdgGyVJy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 985b7a641da9ab22b4f4a47c6f8b92bb
Files
-
985b7a641da9ab22b4f4a47c6f8b92bb.dll windows:4 windows x86 arch:x86
40343bf3dfffffec5547bb48bb0dca61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
ReadFile
FileTimeToLocalFileTime
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetCurrencyFormatA
OutputDebugStringA
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
WriteFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 544KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ