Static task
static1
Behavioral task
behavioral1
Sample
c3ea428730d16ac3533be4a6eb6d0c4f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ea428730d16ac3533be4a6eb6d0c4f.dll
Resource
win10v2004-20240226-en
General
-
Target
c3ea428730d16ac3533be4a6eb6d0c4f
-
Size
30KB
-
MD5
c3ea428730d16ac3533be4a6eb6d0c4f
-
SHA1
c0896027acea7cdff190561fdb3b368680edac45
-
SHA256
909b755852ef847da26252625039236b7aadfc46b5feca9fd8a28d63c13890f5
-
SHA512
b2f3d97772e903ec46828ee902b03bbeef9e26c817761e9209a0b7417a7da80677f30d7a1251c10fe619531d36d5cf432c878434cf8eeea0153b5aade29a25f5
-
SSDEEP
768:4nWPMfQv6LX0myaThED+7XasgpmLWUzPDi2:4nWP0QfmyaduMXab0W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3ea428730d16ac3533be4a6eb6d0c4f
Files
-
c3ea428730d16ac3533be4a6eb6d0c4f.dll windows:4 windows x86 arch:x86
da3f0774ba54ee02d10e90024f32f1f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CreateMutexA
GetCurrentProcessId
CreateThread
GetProcAddress
VirtualAlloc
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateProcessA
GetModuleFileNameA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalUnlock
IsBadReadPtr
ExitProcess
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
WriteProcessMemory
ReadFile
DeleteFileA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
VirtualProtect
GetModuleHandleA
GetCurrentProcess
TerminateProcess
TerminateThread
VirtualProtectEx
Sleep
user32
SetWindowsHookExA
GetWindowThreadProcessId
CallNextHookEx
UnhookWindowsHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetCloseHandle
InternetReadFile
msvcrt
_initterm
malloc
_adjust_fdiv
_strnicmp
_strupr
_stricmp
_strlwr
free
strcpy
sprintf
strlen
memcpy
strcat
memset
??2@YAPAXI@Z
atoi
??3@YAXPAX@Z
strstr
strncpy
strchr
fclose
fread
fopen
strcmp
wcslen
strrchr
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ