ImportFunction
Static task
static1
Behavioral task
behavioral1
Sample
b4cea8e66a89387f33c14b1f631d246e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4cea8e66a89387f33c14b1f631d246e.dll
Resource
win10v2004-20240226-en
General
-
Target
b4cea8e66a89387f33c14b1f631d246e
-
Size
65KB
-
MD5
b4cea8e66a89387f33c14b1f631d246e
-
SHA1
d1343ebfe5670ab5fcd7408d613dbca03d0a68ed
-
SHA256
8421d3886194ff60d4d64fd75a91ca947b26558d09e2db913801226e33fbdaab
-
SHA512
c1691f0a3d66b75247cc763b4ee4ae8089ffaf5f3ded90ee4ee9ea7abc4b54b38ab6e203ac750b40aa84de8ed583a00b2a214d19d3222c94aa542fd2a59280f0
-
SSDEEP
1536:CYJwPkYIz6cIhIe8+6EQh2jNMC2MUSRgvUe9dZ1U7V4pq7T:Vz6rIep6EoCNuOgvUe9dQipq7T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4cea8e66a89387f33c14b1f631d246e
Files
-
b4cea8e66a89387f33c14b1f631d246e.dll windows:4 windows x86 arch:x86
7d5ffadd42462df148e81f9300634cd0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord2725
ord561
ord815
ord2919
ord4129
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord537
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord940
ord922
ord2764
ord3988
ord6781
ord3989
ord939
ord941
ord6877
ord825
ord2915
ord5572
ord860
ord823
ord6143
ord6663
ord4278
ord5710
ord6282
ord6283
ord2763
ord4277
ord6648
ord540
ord2818
ord535
ord6144
ord858
ord5608
ord6883
ord5610
ord5862
ord812
ord559
ord801
ord541
ord800
ord3738
ord1116
msvcrt
__CxxFrameHandler
_mbscmp
atoi
isalnum
??1type_info@@UAE@XZ
srand
time
malloc
_adjust_fdiv
strtol
_strdate
__dllonexit
_onexit
free
_initterm
kernel32
LocalFree
GetCurrentProcess
CreateProcessA
LoadLibraryA
GetProcAddress
MoveFileExA
CreateToolhelp32Snapshot
Process32First
Process32Next
VirtualFree
VirtualAlloc
InitializeCriticalSection
GetFileAttributesA
WriteFile
GetFileSize
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
GetLastError
GetSystemDefaultLCID
LocalAlloc
GetVersionExA
GetSystemInfo
GetCurrentThread
SetThreadPriority
GetProcessShutdownParameters
SetProcessShutdownParameters
SetErrorMode
Sleep
CreateThread
GlobalMemoryStatus
lstrcpynA
DeviceIoControl
GetModuleHandleA
SetFilePointer
lstrlenA
WaitForSingleObject
ReleaseMutex
CreateMutexA
lstrcpyA
CreateFileA
GetSystemDirectoryA
ReadFile
CloseHandle
GetLocaleInfoA
GetModuleFileNameA
user32
ExitWindowsEx
GetKeyboardLayoutList
wsprintfA
GetKeyboardLayoutNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
ole32
CoCreateGuid
shell32
ord680
wininet
InternetReadFile
HttpQueryInfoA
InternetGetConnectedStateExA
InternetGetConnectedState
InternetOpenA
InternetConnectA
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
ws2_32
inet_ntoa
gethostname
gethostbyname
shlwapi
StrStrIA
StrCmpNIA
SHSetValueA
StrToIntA
PathFindFileNameA
PathCombineA
PathRemoveFileSpecA
SHGetValueA
StrCmpNA
imagehlp
ImageUnload
ImageLoad
Exports
Exports
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ