InstallHook
Static task
static1
Behavioral task
behavioral1
Sample
a3cb625da30f989befa7a9ba1c244641.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3cb625da30f989befa7a9ba1c244641.dll
Resource
win10v2004-20240221-en
General
-
Target
a3cb625da30f989befa7a9ba1c244641
-
Size
3KB
-
MD5
a3cb625da30f989befa7a9ba1c244641
-
SHA1
0885deb1c207a60c6b053c0941879fd3a966b59a
-
SHA256
3205c24a1ca4999235e834f67e9c02ba7134e806865376383328a1312a18e43e
-
SHA512
9c8dfbe9684d5ed1f7d77802ff548a5a49ea847f1c360639a0e464b34e67e748ed22650f706362deef8e89c09307cd6c68be68fcf1fa618ec4718ca1449d06fa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3cb625da30f989befa7a9ba1c244641
Files
-
a3cb625da30f989befa7a9ba1c244641.dll windows:4 windows x86 arch:x86
98356fcf908ce80069b3cd187e338747
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
UnmapViewOfFile
lstrlenA
MapViewOfFile
OpenFileMappingA
HeapAlloc
GetProcessHeap
user32
ToAsciiEx
GetKeyboardLayout
GetKeyboardState
PostMessageA
CallNextHookEx
SetWindowsHookExA
SetKeyboardState
GetKeyNameTextA
MapVirtualKeyExA
Exports
Exports
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ