??6slicer_itk@@YAAEAV?$basic_ostream@DU?$char_traits@D@std@@@std@@AEAV12@W4SigmaStepMethod@MultiScaleHessianBasedMeasureImageFilterEnums@0@@Z
Static task
static1
Behavioral task
behavioral1
Sample
fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78.dll
Resource
win10v2004-20240412-en
General
-
Target
fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78
-
Size
12KB
-
MD5
f3357b31f50d1fbbc7c72c37c6e523ca
-
SHA1
269f650623b71d4f37268f5ed6e9097d5b9d96d1
-
SHA256
fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78
-
SHA512
764afc0ab5e14f0f92e4ae746d717a04f6d066abe77db2f52dfb5d3bfe37153ae32856bdb0b344c30685e54651dbe14fcadcdab076d706cccdab56ed513bbe8a
-
SSDEEP
192:zOofg7taUniykzAkBPPR+LRl3glAmprWzwylXSAvX2TrJAU8c1hGV:zOoitaUnigmcdl3uTWrM86
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78
Files
-
fdd4f31322d0cf64a53a629b8bcd47b6269e1c536ef824f0c4dc3e9da9b23b78.dll windows:6 windows x64 arch:x64
fb6223297fc3c1581af4803286235613
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
msvcp140
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
?uncaught_exception@std@@YA_NXZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?width@ios_base@std@@QEAA_J_J@Z
?width@ios_base@std@@QEBA_JXZ
?flags@ios_base@std@@QEBAHXZ
?good@ios_base@std@@QEBA_NXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
vcruntime140
__std_type_info_destroy_list
__C_specific_handler
__std_terminate
memset
memcpy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_execute_onexit_table
_configure_narrow_argv
_seh_filter_dll
_initterm_e
_initterm
_cexit
_initialize_onexit_table
_initialize_narrow_environment
kernel32
QueryPerformanceCounter
IsDebuggerPresent
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
RtlCaptureContext
InitializeSListHead
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
RtlVirtualUnwind
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ