Static task
static1
Behavioral task
behavioral1
Sample
c80a7d323af8241fc481b60f18e49f36.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c80a7d323af8241fc481b60f18e49f36.dll
Resource
win10v2004-20240226-en
General
-
Target
c80a7d323af8241fc481b60f18e49f36
-
Size
52KB
-
MD5
c80a7d323af8241fc481b60f18e49f36
-
SHA1
2abad1b33b0336da7d3884d077cd41b02fae3065
-
SHA256
6e85446aaf2729ca5457cf0e2aa8916774fc5bda2a6d854ea929ea58cfb6bfa8
-
SHA512
bc7467660b090b9a09802d81e8598a8d334bb8590b593949b76a6dc07c10782e8fe7bbd0cdb65165746119ca6b6d3ffc773e02135e1fcaafd5f6e9db8e4418e6
-
SSDEEP
1536:PcX4BBQARhUp7hkRaxdWXPcmzAeViMMsGz0:PcX4BBQSo72Rk5EAecf8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c80a7d323af8241fc481b60f18e49f36
Files
-
c80a7d323af8241fc481b60f18e49f36.dll windows:4 windows x86 arch:x86
f350f9cbf1af96dda1616f978ba6bf3a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
gethostname
ntdll
strstr
strlen
memcpy
memcmp
RtlZeroMemory
kernel32
CreateThread
lstrcmpA
TerminateThread
TerminateProcess
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
FreeLibrary
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
Sleep
CreateToolhelp32Snapshot
IsBadCodePtr
OpenProcess
Process32First
Process32Next
user32
SendMessageA
GetWindowTextA
SetWindowLongA
GetKeyState
wsprintfA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
KillTimer
RegisterWindowMessageA
GetWindowLongA
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
EnumChildWindows
EnumWindows
GetAsyncKeyState
GetClassNameA
GetDlgItem
advapi32
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
ole32
StringFromGUID2
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx1 Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ