Static task
static1
Behavioral task
behavioral1
Sample
ca15bb4bf910372095829bd7555ea90d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca15bb4bf910372095829bd7555ea90d.dll
Resource
win10v2004-20240226-en
General
-
Target
ca15bb4bf910372095829bd7555ea90d
-
Size
176KB
-
MD5
ca15bb4bf910372095829bd7555ea90d
-
SHA1
dde27f59fef8ed567820ba5a181c06cbf578326d
-
SHA256
f06ef06bf8fb204aafcfbe1da0b58ead83dda02a167f2d61129413266ca46d3f
-
SHA512
8d782b88a0790cce3cc7eaf91904143ba80cab19ca16129f02c5b503836d5a7a3ef9cfdd931964271c77b42f0af5878aaf0a328875af34e15d216e3497191764
-
SSDEEP
3072:cAzsUJvO2pTuDxNDP3RzdLYXyR68g3kUbeKxDmtPYw:cRUxuzB9YXIaUH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca15bb4bf910372095829bd7555ea90d
Files
-
ca15bb4bf910372095829bd7555ea90d.dll windows:4 windows x86 arch:x86
93c458592c58ddc9629cc1257b4343d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
SetFilePointer
LoadLibraryW
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
GetProcAddress
FindClose
SystemTimeToFileTime
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ