ProcDeListing
Static task
static1
Behavioral task
behavioral1
Sample
0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837.dll
Resource
win10v2004-20240426-en
General
-
Target
0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837
-
Size
7KB
-
MD5
d3b3b735bcf40887aba67398d908346a
-
SHA1
505747e4d3ddb569f603aba80b584da4ae57201d
-
SHA256
0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837
-
SHA512
5ed83e60b8534c522002fdcd8db16d0fb7a4ff76d491e3c4c47addb0309439370c7855b24e9e5b7c2d9d92bfc01ba8b2a3b61b7de2192b4d2e11c9c196910873
-
SSDEEP
96:nPyLmDejAZ+RSSSSMgK5tv5EgZ72nYcTnnpO1gvRix7F4E:nMuZ+RSSSSl0PcTnpWpF5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837
Files
-
0a4f9bcc0ae78d04aa99f4f78fa3f82d887035ad5cf177845493b1b60949d837.dll windows:1 windows x86 arch:x86
4aef5c20b74a50ccf54501baa67b4158
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
TlsFree
LocalFree
HeapAlloc
TlsGetValue
TlsAlloc
Sleep
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
TlsSetValue
GetVersion
HeapFree
LocalAlloc
advapi32
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
user32
SendMessageA
GetWindowTextA
GetWindowLongA
GetClassNameA
CallNextHookEx
Exports
Exports
Sections
CODE Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ