winsockinit
Static task
static1
Behavioral task
behavioral1
Sample
ac964f92d3f93ebf4a6667ba45826729.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac964f92d3f93ebf4a6667ba45826729.dll
Resource
win10v2004-20240226-en
General
-
Target
ac964f92d3f93ebf4a6667ba45826729
-
Size
7KB
-
MD5
ac964f92d3f93ebf4a6667ba45826729
-
SHA1
15dc27c86ad315b9bab6278fbcb231ee6a29d464
-
SHA256
97050ce97648687752ed2651b66511ce18b4d8bcd2068655095ed7e4db61fead
-
SHA512
21fdb4e4b499c86e576d89f46cfb96b2738fe6ffa689d7ebf1436693e971d868198d387b62b23afbdbd9ec024fa5b5ead068f6cb1b2ad86cebe897aa2fe41f99
-
SSDEEP
192:FBRHexHUV72GceOZGHHM6iXTutlG9j6I7:FDexsROZuHXiXWij6s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac964f92d3f93ebf4a6667ba45826729
Files
-
ac964f92d3f93ebf4a6667ba45826729.dll windows:4 windows x86 arch:x86
4073e623dad0c4d3436b08eec52ee1e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WinExec
Sleep
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcpyA
TerminateProcess
GetCurrentProcess
lstrcpynA
GetModuleHandleA
LoadLibraryA
DisableThreadLibraryCalls
CreateThread
GetCommandLineA
GetModuleFileNameA
GetProcAddress
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
ReadProcessMemory
VirtualProtect
IsBadCodePtr
user32
CallNextHookEx
SetWindowsHookExA
FindWindowA
CharLowerA
wsprintfA
Exports
Exports
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ