Static task
static1
Behavioral task
behavioral1
Sample
c56dd02bf3f2be034a1e87dffc46973f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c56dd02bf3f2be034a1e87dffc46973f.dll
Resource
win10v2004-20240226-en
General
-
Target
c56dd02bf3f2be034a1e87dffc46973f
-
Size
28KB
-
MD5
c56dd02bf3f2be034a1e87dffc46973f
-
SHA1
2938c01b06d07b600d29ffdcdb7196aa7d9a8a07
-
SHA256
ee32c48f175e97dfc6711825ae03b428c9d4d93a8ad7f0ab00ce276949a7804f
-
SHA512
aa9c46e24185eaff06e1accd1137e8fd2c85495c6c0fb614a51306bcf994d717897e0e9f95bb77289623fba8bdccc801ead608ba0489215e6e60f4f524aef73b
-
SSDEEP
768:++UdKVevemAwUeCocDLIYoY96DP3te5+P43Ir7:ydKVeWpwcDROP9gIr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c56dd02bf3f2be034a1e87dffc46973f
Files
-
c56dd02bf3f2be034a1e87dffc46973f.dll windows:4 windows x86 arch:x86
bdf20afd5692acf378b20fc8b7195f64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ResetEvent
WaitForSingleObject
GetLastError
CreateEventA
SetEvent
WriteFile
IsBadReadPtr
GetCommandLineA
CreateMutexA
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetTickCount
VirtualProtectEx
InitializeCriticalSection
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
GetPrivateProfileStringA
SetUnhandledExceptionFilter
DeleteFileA
SetThreadContext
OpenThread
Thread32First
CreateToolhelp32Snapshot
WideCharToMultiByte
GetProcAddress
LoadLibraryA
ReadProcessMemory
WriteProcessMemory
GetTempPathA
GetModuleHandleA
CreateFileA
ReadFile
CloseHandle
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
TerminateThread
CreateThread
Thread32Next
Sleep
user32
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
GetForegroundWindow
GetWindowTextA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_strnicmp
_stricmp
_strlwr
wcslen
strcmp
fopen
fread
fclose
sprintf
strcpy
strlen
strstr
memset
strcat
memcpy
??2@YAPAXI@Z
strrchr
rand
srand
strncpy
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ