Static task
static1
Behavioral task
behavioral1
Sample
a420d2bb031e1ceef6e3eec1daef079a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a420d2bb031e1ceef6e3eec1daef079a.dll
Resource
win10v2004-20240221-en
General
-
Target
a420d2bb031e1ceef6e3eec1daef079a
-
Size
24KB
-
MD5
a420d2bb031e1ceef6e3eec1daef079a
-
SHA1
01275c53020cc1acaf5b636dfdd18ae687100f20
-
SHA256
f2ca3b84febe60837db5b9492bf9fccc5a9afefd24e7bbca335f5e8bd157222a
-
SHA512
3e2f26671816013381696f6477ff0426064f44633b5d514621bf811407832f928b8271fa2a5d197e9b312c046eadc70dde406f336783e2a2012db61773f96a1f
-
SSDEEP
384:UabNBb4LLHB5PzVDu9H77XnXUWXpct5C:UabcbpDyzXUAat5C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a420d2bb031e1ceef6e3eec1daef079a
Files
-
a420d2bb031e1ceef6e3eec1daef079a.dll windows:4 windows x86 arch:x86
386f88eeb50ab2416d0be2e55350718c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
ntohs
msvcrt
time
fwrite
strrchr
atoi
free
_initterm
_strupr
_adjust_fdiv
fopen
fseek
ftell
??2@YAPAXI@Z
memset
fread
fclose
strstr
strchr
strncpy
??3@YAXPAX@Z
_strlwr
_itoa
memcpy
malloc
kernel32
CreateThread
CopyFileA
GetProcAddress
ExitProcess
GetTickCount
GetModuleHandleA
GetTempPathA
Sleep
lstrlenA
lstrcpyA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
GetModuleFileNameA
LoadLibraryA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ