Static task
static1
Behavioral task
behavioral1
Sample
b7b19cde1b00175b4b31834776c49094.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7b19cde1b00175b4b31834776c49094.dll
Resource
win10v2004-20240226-en
General
-
Target
b7b19cde1b00175b4b31834776c49094
-
Size
8KB
-
MD5
b7b19cde1b00175b4b31834776c49094
-
SHA1
d08481cc5c3d3145e98b0f4b626a244510e6779d
-
SHA256
83fdbb0babed3d0c759d22682443f4f0b818082badeddb8861fc2da5ecb2e295
-
SHA512
496704ae5ce07df8afefab383675e247bde15620ed4d24f04ecaadcdba921794191c68266ffa76d0bdea60bef2f2e1a9742f555fa060720823fd54b4112d7565
-
SSDEEP
192:FXTb8DZ5cFzHYjpAZHoxsVkcOewgRM0dgY0Ru3:9my4ImsROXWdGRu3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7b19cde1b00175b4b31834776c49094
Files
-
b7b19cde1b00175b4b31834776c49094.dll windows:4 windows x86 arch:x86
889e54a0b86caaa5bf37242465ab4918
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
SendDlgItemMessageA
SendMessageA
GetDlgItemTextA
GetClassNameA
GetWindowTextA
EnumThreadWindows
kernel32
GetModuleHandleA
GetProcAddress
GetCurrentProcess
VirtualAlloc
DeleteFileA
ExitThread
CreateThread
LoadLibraryA
IsBadReadPtr
CreateFileA
DeviceIoControl
CloseHandle
GetComputerNameA
GetWindowsDirectoryA
GetDriveTypeA
GetVolumeInformationA
Sleep
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
Thread32Next
DisableThreadLibraryCalls
GetModuleFileNameA
advapi32
GetUserNameA
GetCurrentHwProfileA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ