Static task
static1
Behavioral task
behavioral1
Sample
cd48f691a8844fde2db4e4c69eafd16e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd48f691a8844fde2db4e4c69eafd16e.dll
Resource
win10v2004-20240226-en
General
-
Target
cd48f691a8844fde2db4e4c69eafd16e
-
Size
1.2MB
-
MD5
cd48f691a8844fde2db4e4c69eafd16e
-
SHA1
d27b579c80f27c1ce731ddf1c52b91bca5d10a3f
-
SHA256
40cdd570d06d5a9383e3fb94eb634bc0cb0419a7589d89fd31a612e5970bcbe0
-
SHA512
bd5c7264e3e9000f988a74c57fda75d72102d19a7ee4109278279bbaed8fd9920413e5c67758f30d380e308bae80381c3fffa537e317630c962e49730022f17a
-
SSDEEP
24576:HBxRF4n0gx5dJQHFZV9QnEGla/bhT9sVhG2zN4sqpsOo:HrRanLxDoFZV6Ez/rOjopVo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd48f691a8844fde2db4e4c69eafd16e
Files
-
cd48f691a8844fde2db4e4c69eafd16e.dll windows:4 windows x86 arch:x86
7c32e9c0af24bede5fca7e7833321bd9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32 user32
IsWindowVisible R
user32
IsWindowVisible
IsDlgButtonChecked
GetWindowRect
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
KillTimer
EnableWindow
DestroyWindow
CreateDialogParamA
ChildWindowFromPoint
LoadStringA
MessageBoxA
PostMessageA
PostQuitMessage
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetDlgItemTextA
SetTimer
SetWindowPos
SetWindowTextA
CallNextHookEx
CheckDlgButton
SetWindowsHookExA
ShowWindow
UnhookWindowsHookEx
FindWindowA
wsprintfA
kernel32
lstrcmpA
FindClose
GetModuleFileNameA
lstrlenA
lstrcpyW
lstrcpyA
FindFirstFileA
lstrcatW
lstrcatA
WriteProcessMemory
WritePrivateProfileStringA
WideCharToMultiByte
VirtualQueryEx
VirtualProtectEx
UnmapViewOfFile
SizeofResource
SetThreadAffinityMask
RtlZeroMemory
RtlMoveMemory
ReadProcessMemory
Process32Next
Process32First
OutputDebugStringA
OpenFileMappingA
MultiByteToWideChar
MapViewOfFile
LockResource
LoadResource
LoadLibraryA
CloseHandle
CreateFileA
CreateFileMappingA
CreateToolhelp32Snapshot
DeleteFileA
DeviceIoControl
FindResourceA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetTickCount
GlobalAlloc
HeapAlloc
HeapFree
LCMapStringA
comctl32
ImageList_Create
advapi32
CreateServiceA
CloseServiceHandle
OpenSCManagerA
StartServiceA
DeleteService
wsock32
WSAAsyncSelect
recv
send
ws2_32
WSASocketA
ole32
CoUninitialize
CoInitializeSecurity
CoCreateInstance
CoInitializeEx
iphlpapi
GetAdaptersInfo
shell32
SHGetFolderPathA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.v-lizer Size: 178KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 15KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 926KB - Virtual size: 928KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
SE Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ