?SetHook@@YGXXZ
Static task
static1
Behavioral task
behavioral1
Sample
98c49c253c705907d55c1252fec449d7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98c49c253c705907d55c1252fec449d7.dll
Resource
win10v2004-20231215-en
General
-
Target
98c49c253c705907d55c1252fec449d7
-
Size
6KB
-
MD5
98c49c253c705907d55c1252fec449d7
-
SHA1
ade27d5ac3547d67e15f7040af947e0f72be1200
-
SHA256
872a997270ce52bff6c0c78803329dbbf4114e8444ff8dd908547813093542a6
-
SHA512
9ff65b7e1f262766afd43835698187a0078be4183bb149a286af393abafddf704a9a1aaa02f4132a12708e813b61db09ca78bc46521e18dde371daf773846255
-
SSDEEP
96:VYidCMOoWrbjW/6DDPNkP0c+jNSj5znTZuHhfWOuccl115Av0v:VYi8VrXWSnNkP0pEj1nTZmB1v2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98c49c253c705907d55c1252fec449d7
Files
-
98c49c253c705907d55c1252fec449d7.dll windows:4 windows x86 arch:x86
41105f20f15624be1f6266258610f827
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
msvcrt
malloc
_initterm
_strlwr
free
isalnum
rand
??3@YAXPAX@Z
strstr
strrchr
_strupr
srand
??2@YAPAXI@Z
_snprintf
_adjust_fdiv
kernel32
GetSystemDirectoryA
TerminateThread
CreateThread
LoadLibraryA
GetModuleFileNameA
Sleep
GetTickCount
DeleteFileA
CloseHandle
WriteFile
WinExec
CreateFileA
user32
FindWindowA
FindWindowExA
SendMessageA
ShowWindow
CallNextHookEx
SetWindowsHookExA
wsprintfA
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
Exports
Exports
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ