installhook
Static task
static1
Behavioral task
behavioral1
Sample
b4a59e6437eaa36641bb9a9277a602fe.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4a59e6437eaa36641bb9a9277a602fe.dll
Resource
win10v2004-20240226-en
General
-
Target
b4a59e6437eaa36641bb9a9277a602fe
-
Size
64KB
-
MD5
b4a59e6437eaa36641bb9a9277a602fe
-
SHA1
8dac52c532c9c43c0e8b750f95f92204fa8a3daa
-
SHA256
b4f4cc8689d7bf4e6ecfb1c857cc03c6d9089a263fc728e678253d5af921b530
-
SHA512
e2fa81399c9170255657064a7239cd4304f16fdf1bfb4d03759315838e959f002f2a5ab2626bc452fca7e4a166e00b45f1f3c4a39cba9d656970e8d5f3505e51
-
SSDEEP
1536:J9keo5N/3RpMyGmygI4UPCJ8ymM4Ir5/ZLlfGv:J2Lcg2PCIIhLlfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4a59e6437eaa36641bb9a9277a602fe
Files
-
b4a59e6437eaa36641bb9a9277a602fe.dll windows:4 windows x86 arch:x86
2050320ffb4149b78ebbc1a74bdc360f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTempPathA
FreeLibrary
CloseHandle
OpenProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetCurrentProcess
TerminateProcess
GetFileSize
OpenFile
WriteFile
Sleep
lstrcpyA
CreateThread
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
SetFilePointer
HeapSize
LCMapStringW
LCMapStringA
lstrcatA
GetPrivateProfileStringA
WritePrivateProfileStringA
ReadFile
InitializeCriticalSection
HeapReAlloc
GetOEMCP
GetACP
GetLocaleInfoA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
MultiByteToWideChar
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
InterlockedExchange
GetStringTypeA
GetStringTypeW
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
user32
wsprintfA
GetWindowRect
GetWindowLongA
CallNextHookEx
FindWindowExA
SendMessageA
EnumChildWindows
ScreenToClient
SetWindowsHookExA
ws2_32
closesocket
recv
send
connect
htons
gethostbyname
socket
WSAStartup
gethostname
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mir Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ