___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7.dll
Resource
win10v2004-20240226-en
General
-
Target
4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7
-
Size
320KB
-
MD5
e5a11eda953024c93b0162033f6f66df
-
SHA1
0330b4a069955d1e9d19f703b37ded34b09686f9
-
SHA256
4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7
-
SHA512
751a4bbaafa8c0f2adf78678290f7970b1990bab0aa3789585e573aa890f38c149bb32c49cc6da58d24ca6a43861f7b7d7bbeece9fe8263a3eda4787c374c1a7
-
SSDEEP
6144:UpJVH7LkN0JX2m/NBp7KgaxDDVf0StgzuxhgdJgNbOI31isrZ3B5Zm:ae09KgaxDDVVtgzuxhWJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7
Files
-
4e5e0882055d99680bb966c849335e423cf923b35d1cf9644a1700d58ed412d7.dll windows:4 windows x86 arch:x86
4acfba0a8a4ba9255fe31ec541fcfcf9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadLocale
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
user32
CharNextA
EnumThreadWindows
GetKeyboardType
GetSystemMetrics
LoadStringA
MessageBoxA
wsprintfA
oleaut32
SysAllocStringLen
SysFreeString
SysStringLen
VariantChangeTypeEx
VariantClear
VariantCopyInd
Exports
Exports
Sections
.text Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 224KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ