Static task
static1
Behavioral task
behavioral1
Sample
bbb09b404ada21ef07f05e6b05997b4a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbb09b404ada21ef07f05e6b05997b4a.dll
Resource
win10v2004-20240226-en
General
-
Target
bbb09b404ada21ef07f05e6b05997b4a
-
Size
28KB
-
MD5
bbb09b404ada21ef07f05e6b05997b4a
-
SHA1
7d7332a9da4be3e5302ce1d7ded8b1bd719a19fb
-
SHA256
39404016545834ab2b6ecbc77471e2e09fbcfb970e3b59b58b232cdcfc1c9e2e
-
SHA512
03aaa72ea776824002abfbba88ff3633b55e20bf7303026366df2f38df45676bcbd9f14629ad26142c9e02d66ae493ac7dc796e9aa656d2656849f5f79d348cc
-
SSDEEP
768:XQ2ThfuR41cUrZwzPkZTemuDc86Nybh205Pkf:g2ThfCqcEZwzP9c86okf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbb09b404ada21ef07f05e6b05997b4a
Files
-
bbb09b404ada21ef07f05e6b05997b4a.dll windows:4 windows x86 arch:x86
483d6dc45f7d99e65086238aaf2726da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
VirtualAlloc
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
Thread32Next
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
WriteProcessMemory
ReadFile
CloseHandle
GetCommandLineA
IsBadReadPtr
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
VirtualProtect
Sleep
user32
FindWindowA
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowThreadProcessId
GetForegroundWindow
wininet
InternetCloseHandle
InternetReadFile
msvcrt
_initterm
malloc
_adjust_fdiv
_strupr
_stricmp
_strlwr
_strcmpi
free
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
atoi
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
strcmp
wcslen
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ