msjint40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05.dll
Resource
win10v2004-20240226-en
General
-
Target
f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05
-
Size
148KB
-
MD5
64426fe5b9fcc6601e2a9e74fe4278b1
-
SHA1
4a9942d971ece5fcdc02d1c536958928e25ab0b3
-
SHA256
f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05
-
SHA512
ef159203e9939a5a30bdbe2069a2fb6bfe80b3a08032c6574c87070b89a05e1688890a71cfdd8fe1eb48774db61327795e9bd06b0b9adaf15f6a474d6bee4142
-
SSDEEP
3072:TOb9RbScz9qjUnYCmo1qihpvjA/IMXBJ9sc2MfcY:ccwWihpvs39ncY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05
Files
-
f012b1a3c7778fe55c7aaa08305e15e235303cff1c7a6f5d9d82a22d7ccc9e05.dll windows:6 windows x86 arch:x86
20e3738a9fffa0250845e3b880caabfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DisableThreadLibraryCalls
LoadResource
LockResource
FindResourceA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
Exports
Exports
CchLszOfId2
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 334B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ