Static task
static1
Behavioral task
behavioral1
Sample
ad787e87cb28e305fe034042b80f8dff.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad787e87cb28e305fe034042b80f8dff.dll
Resource
win10v2004-20240226-en
General
-
Target
ad787e87cb28e305fe034042b80f8dff
-
Size
28KB
-
MD5
ad787e87cb28e305fe034042b80f8dff
-
SHA1
4c9590781d22290b92b8d126c0bb97334aaf1b29
-
SHA256
bde33deab44480c9c5134ba4cc8b94cb2e59c686c6a6d447f4d6c708b3eb417a
-
SHA512
d08dd17c35c3c43bbcc4b8ebf65c825e37f856e0a29da68c66f9d660ad11e704cec2e8944a8999b9a78a0d05d42b0ae46c2e99425a45723df775b421d6b72b38
-
SSDEEP
384:qD8qJ1sfmcCDVFAPQd61VT5T9gTcpLWIkvOv49vViK0:y8yxTVFA4d61VT5T9gTc1WIkN9vB0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad787e87cb28e305fe034042b80f8dff
Files
-
ad787e87cb28e305fe034042b80f8dff.dll windows:4 windows x86 arch:x86
7ba1af23fa01586f1de70efc3fe533c6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
EnumWindows
msvcrt
strchr
free
memcmp
malloc
_adjust_fdiv
_itoa
atoi
memcpy
strcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
_initterm
kernel32
Sleep
CreateThread
ExitProcess
lstrcmpA
lstrlenA
LoadLibraryA
CopyFileA
GetProcAddress
GetModuleFileNameA
GetTempPathA
lstrcpyA
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 970B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ