Behavioral task
behavioral1
Sample
c59fbe44ea59dfbdef4d95e239c995c0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c59fbe44ea59dfbdef4d95e239c995c0.dll
Resource
win10v2004-20231215-en
General
-
Target
c59fbe44ea59dfbdef4d95e239c995c0
-
Size
35KB
-
MD5
c59fbe44ea59dfbdef4d95e239c995c0
-
SHA1
a5e24d44fdaa45e4889455bd01b14cd824bebd3d
-
SHA256
fa4d64b11fe2036aad06e2be1c6956c69193b397843cb39661afef445224bf29
-
SHA512
67a0a19f046691748c79461f6f89b7828d91eff7eb57d3575f68320d68e9bae394fd4276cd978186571c423a518d58dcfdb8e4ba6bc6bd7848ce55126da39512
-
SSDEEP
768:Ecoxi8wYWR3yVMo0Bo9yMCHzVtiLdiLLgNTREln4dvM7mrWGVA:ElkYWUMxBvKvT++vmmaV
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c59fbe44ea59dfbdef4d95e239c995c0
Files
-
c59fbe44ea59dfbdef4d95e239c995c0.dll windows:4 windows x86 arch:x86
82bb21018f17dec773d077789db2d473
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
DrawTextA
CreateDesktopW
CopyRect
CloseWindow
CharUpperA
ActivateKeyboardLayout
kernel32
GetStartupInfoA
lstrcpyA
UnmapViewOfFile
TlsSetValue
TlsFree
Sleep
ReadFile
EnumResourceLanguagesA
ExitProcess
FlushFileBuffers
FreeResource
GetDateFormatA
GetFileSize
GetSystemTimeAsFileTime
GetTimeFormatA
InitializeCriticalSection
LeaveCriticalSection
OpenFile
RaiseException
Sections
.text Size: 17KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ