_SbieDll_Hook@16
Static task
static1
Behavioral task
behavioral1
Sample
34b8b2ac2079df745a18a92e9b5ccc70N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34b8b2ac2079df745a18a92e9b5ccc70N.dll
Resource
win10v2004-20240709-en
General
-
Target
34b8b2ac2079df745a18a92e9b5ccc70N.exe
-
Size
4.7MB
-
MD5
34b8b2ac2079df745a18a92e9b5ccc70
-
SHA1
517dc9bb95d6a8863d676579cf8f6b5bb3aa1f82
-
SHA256
8fe2fe311c62bba63eb9ce6b06073e719ab348c014f4ba57926224494cbeb1b7
-
SHA512
066aa31e558117e9fabd3c1f0149eec844e3067a3524635ed02a60cc365aaad6819aaf3df24dc63b0b4068af75d346f2c658dca489ede56f4b93e039feb91a43
-
SSDEEP
98304:XfKvdjBBRLhaAfvgQHWyQLAFdH8zsgI9ElpG6XVLM/22wBGp68NjriBL3If:vKvdjdL1vxWyQLmdcIzmlpGYoyopRKLK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34b8b2ac2079df745a18a92e9b5ccc70N.exe
Files
-
34b8b2ac2079df745a18a92e9b5ccc70N.exe.dll windows:6 windows x86 arch:x86
b4ca6f0ad0fe5ce382aa3bee0f2fba93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
Exports
Exports
Sections
.text Size: - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c+w Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.*rn Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SXP Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ