ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
ae3297a0b4b585b41d79677ff7948d0f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae3297a0b4b585b41d79677ff7948d0f.dll
Resource
win10v2004-20240226-en
General
-
Target
ae3297a0b4b585b41d79677ff7948d0f
-
Size
12KB
-
MD5
ae3297a0b4b585b41d79677ff7948d0f
-
SHA1
02eb6d85b2f4a38da590a6b4db9c4348bfe48d17
-
SHA256
d009040d1091c936e993aed8dbbc85d3627606b947544eff0087e431a14c12f2
-
SHA512
1ac1b35e2217ee29f83aa431f25615e1517c12cf826767066b74f501e9ae17bb6c40d7fd484c605e44ee5ad54d5b6a4cde2df352671662ee1a01d0cfeada2534
-
SSDEEP
192:yP5uw1fwdt5WN8jpulbE7RM80uMr6LdRjA/GuIRSk7FxUnyI:IhVwd68jpulbfXuOmRMu3RrFxUn9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae3297a0b4b585b41d79677ff7948d0f
Files
-
ae3297a0b4b585b41d79677ff7948d0f.dll windows:4 windows x86 arch:x86
7c6917c164ea912fa5811c85fa950e44
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
msvcrt
_strdup
ws2_32
WSAStartup
user32
PeekMessageA
advapi32
DeleteService
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE