Static task
static1
Behavioral task
behavioral1
Sample
c80615b56670ed54db4e83c07ae73c0b.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c80615b56670ed54db4e83c07ae73c0b.dll
Resource
win10v2004-20240226-en
General
-
Target
c80615b56670ed54db4e83c07ae73c0b
-
Size
28KB
-
MD5
c80615b56670ed54db4e83c07ae73c0b
-
SHA1
1daec2392166d94d04c06d1ae0cb72f33d414ef3
-
SHA256
de87a92b578b9c78d3521910664f9c27cef26b702f0be9bd58c66ab99e2bfe8f
-
SHA512
c4c1a55e5336c3f2baeed49add85374367c61169e602b00643f412fe61218f999a97f6a0b44c08e6a88d5fed48c7b02d3c3d0db4631cc5959fbb620620774eb5
-
SSDEEP
384:eF68WLTqkuKghIfKCdj2Dl4jGMQJ2QbDLVsBxarG2z9APi2W2MscV82lRq2V6n:WsLhUIf9d2DlYPQEq2OtBP62mC6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c80615b56670ed54db4e83c07ae73c0b
Files
-
c80615b56670ed54db4e83c07ae73c0b.dll windows:4 windows x86 arch:x86
5b248cf116355d6e762df2e125959b29
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
LoadLibraryA
GlobalLock
GlobalAlloc
ExitProcess
InitializeCriticalSection
GetModuleHandleA
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
SetThreadContext
GetCommandLineA
SetUnhandledExceptionFilter
ReadProcessMemory
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
VirtualAlloc
GetTempPathA
CreateFileA
ReadFile
CloseHandle
GetLocalTime
DeleteFileA
Sleep
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
OpenThread
GetLastError
user32
GetWindowThreadProcessId
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
FindWindowA
GetForegroundWindow
GetKeyboardState
ToUnicode
wininet
InternetCloseHandle
InternetReadFile
msvcrt
free
_initterm
malloc
_strnicmp
_adjust_fdiv
_stricmp
_strupr
_strlwr
atoi
strrchr
fopen
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
wcslen
fclose
fread
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ