Static task
static1
Behavioral task
behavioral1
Sample
c2faac5c8298a1acd2514c3282b8dd39.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2faac5c8298a1acd2514c3282b8dd39.dll
Resource
win10v2004-20240226-en
General
-
Target
c2faac5c8298a1acd2514c3282b8dd39
-
Size
8KB
-
MD5
c2faac5c8298a1acd2514c3282b8dd39
-
SHA1
60ac3cae7d623040ed7b065a66f55be817fdb974
-
SHA256
f73491c68ed12396a9783d163d29dc7e80330fb538d4caa0dd7b5e6bdd851451
-
SHA512
333988c8be2c46faf1551163b6c464442299b274284921e05823ed3805ff932721cbcdce391115f5b1db56db52d0b378d74d98dfa42645de1382c5dafd2793c7
-
SSDEEP
192:3ZmfeJxyhJlJkoOqtugE69crh2MW2YJPSkImp1QU:UfeJxyRbtwGcrj4/QU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2faac5c8298a1acd2514c3282b8dd39
Files
-
c2faac5c8298a1acd2514c3282b8dd39.dll windows:4 windows x86 arch:x86
ac3ccf0383dfb60160537310d11dc28e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualProtect
CloseHandle
CompareStringA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
OpenProcess
lstrlenA
CreateThread
GlobalFree
ReadProcessMemory
GlobalLock
GlobalAlloc
GetCurrentProcess
Sleep
IsBadReadPtr
LoadLibraryA
FreeLibrary
GetModuleFileNameA
user32
wsprintfA
GetWindowThreadProcessId
FindWindowA
SetTimer
KillTimer
TranslateMessage
DispatchMessageA
GetMessageA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 514B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ