DSM_Entry
Static task
static1
Behavioral task
behavioral1
Sample
9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a.dll
Resource
win10v2004-20240226-en
General
-
Target
9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a
-
Size
64KB
-
MD5
c75c2bbb613153897f311168b4f0ab72
-
SHA1
6e2c478177338cb9586e77cc3ac6640c37d188e9
-
SHA256
9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a
-
SHA512
90e9c229621ca5524e96ff9e2431b8d9cce80a0ca4e722c7571f0ed92c3e77b1f25f443212a80efd13466dcc66f160b7fcef794562e528a2a4686829d0e50b69
-
SSDEEP
384:I8pfmeyIVnVEJwOIJ/fUinYTimKQgtp4G/dWmCjNbTXgXPkEDsaZysfRfYdVwL+m:IkfdV4tIJ/ZYI/YmCxwJZrqAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a
Files
-
9025e59f797950489c174f133eab10383540e3fe87d00dc999c10df96fbba98a.dll windows:4 windows x64 arch:x64
e0560c2cd60459b51f2a3d742d16026c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
FreeLibrary
GetModuleHandleW
GetProcAddress
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
IsBadStringPtrW
LoadLibraryW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
_wcsdup
free
fwrite
getenv
memcmp
memcpy
memmove
realloc
strchr
strcmp
strcpy
strcspn
strlen
user32
DialogBoxParamW
EnableWindow
EndDialog
GetDlgItem
GetWindowLongPtrW
IsWindow
PeekMessageW
PostMessageW
RegisterWindowMessageA
SendMessageA
SendMessageW
SetWindowLongPtrW
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 416B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 874B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ