eloj
Static task
static1
Behavioral task
behavioral1
Sample
ac4ef6377d6dc936cc387b9e026708df.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac4ef6377d6dc936cc387b9e026708df.dll
Resource
win10v2004-20240226-en
General
-
Target
ac4ef6377d6dc936cc387b9e026708df
-
Size
48KB
-
MD5
ac4ef6377d6dc936cc387b9e026708df
-
SHA1
bcb3983a8a17cd554bc6e32fddf0f53b67203e27
-
SHA256
e4da00abc5e65fdae08ca6c48250c8bdb4f5af42e62a716e891e0d73a6383d22
-
SHA512
cbc167a2ec3ba83c3b27bcd19167cff4d0dc981ec07e82aff2a519b5ef0085d78398813f717ade8615ac46bf5611ebe54403598693255bd598dcf5c6eb81215d
-
SSDEEP
768:kyFhSS5Ypi0KmK7Z4JjrVFkqufHP0mfmr22RpUfg7Vmj/VL5XRInimAIr4fBsf0f:dYSmpzcZ4JfVFvu/cgUyfgwzxl8AIrzq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac4ef6377d6dc936cc387b9e026708df
Files
-
ac4ef6377d6dc936cc387b9e026708df.dll windows:4 windows x86 arch:x86
d0827a40bdc2c78e81b27583c18712d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHRegDuplicateHKey
kernel32
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetFilePointer
CreateFileA
FlushFileBuffers
SetStdHandle
VirtualQuery
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CloseHandle
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
TlsFree
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
GetStringTypeW
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
GetLocalTime
GetCommandLineA
GetStartupInfoA
SetEndOfFile
GetLocaleInfoA
ReadFile
VirtualProtect
GetSystemInfo
lstrcpynA
lstrcmpA
OutputDebugStringA
GetWindowsDirectoryA
GetVersionExA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateMutexA
lstrcmpiA
GetSystemDirectoryA
GetPrivateProfileStringA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetPrivateProfileSectionA
lstrlenA
lstrcpyA
FindFirstFileA
FindClose
GetLastError
InterlockedDecrement
InterlockedExchangeAdd
Beep
GetModuleHandleA
GetProcessHeap
ole32
CoInitialize
advapi32
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
mmioInstallIOProcA
setupapi
SetupCloseInfFile
SetupFindNextLine
SetupGetLineTextA
SetupFindFirstLineA
SetupOpenInfFileA
Exports
Exports
Sections
.code Size: 42KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 622B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ