Static task
static1
Behavioral task
behavioral1
Sample
c5757e4b8a17cb2c3ce7bd11c09b6486.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5757e4b8a17cb2c3ce7bd11c09b6486.dll
Resource
win10v2004-20240226-en
General
-
Target
c5757e4b8a17cb2c3ce7bd11c09b6486
-
Size
28KB
-
MD5
c5757e4b8a17cb2c3ce7bd11c09b6486
-
SHA1
97c5ea2460b8bd52efd6290582441dff78e28fbe
-
SHA256
7b1b905cec62d9b74045ff01fb8800cab3cc62c44bd0b5fde83eb1f11d1c0add
-
SHA512
e624135c4a54345c2f138ea51629f7a5853ac86df34fd9d2a70d759c75e55bcddd42b5d74bd2a0789719955ad55d700a78c23b2cd0189a3cb93b76884b363645
-
SSDEEP
384:Um5EciC/oB/8pjgYw6gmPTEstdW5aKe4p6xrcpct5bX:UNC/7pgx6geTEstM5zvp4rcat5r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5757e4b8a17cb2c3ce7bd11c09b6486
Files
-
c5757e4b8a17cb2c3ce7bd11c09b6486.dll windows:4 windows x86 arch:x86
dd450209da3963cb30b00fe6a9f14c72
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
ntohs
msvcrt
malloc
_adjust_fdiv
_initterm
_strupr
free
strrchr
memcmp
atoi
strncpy
memcpy
strchr
strcmp
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fread
fclose
fwrite
time
memset
_strlwr
_itoa
kernel32
GetCommandLineA
Sleep
GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcAddress
GetModuleFileNameA
GetTempPathA
CreateThread
lstrlenA
SetEvent
WaitForSingleObject
lstrcpyA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
CreateEventA
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ