_LibMain@12
Static task
static1
Behavioral task
behavioral1
Sample
14c9262de8fa5645656d31aff8143650N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14c9262de8fa5645656d31aff8143650N.dll
Resource
win10v2004-20240709-en
General
-
Target
14c9262de8fa5645656d31aff8143650N.exe
-
Size
6KB
-
MD5
14c9262de8fa5645656d31aff8143650
-
SHA1
b6df1beb86c50f06ba7f0fd7b1c724e6c7023bfb
-
SHA256
1511ac6fb9174cfc2c9658ce41e4464b2dca29c856a42b288360a7171491ccf8
-
SHA512
87d5551c3e16455bdf0615331c909de6dac9e5de4d8bfcda2558d524330f18289355ef91e5dc452cc3dd58d1f9e99450e4d16867dfe5e6c8d9f63e62c49cfd9a
-
SSDEEP
48:6PKsWEg5YVObZiVk6O/KwhdHr2l05hKHW+BbgcH9c9JkWa0:eNybZiVk6O/rn2RHLjHiXra0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14c9262de8fa5645656d31aff8143650N.exe
Files
-
14c9262de8fa5645656d31aff8143650N.exe.dll windows:1 windows x86 arch:x86
2d8cca97e4f58f1cbb065fa699b27296
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
GetCurrentProcessId
GetEnvironmentStringsA
GetModuleFileNameA
CloseHandle
GetSystemDirectoryA
GetTickCount
GlobalAddAtomA
IsDebuggerPresent
OpenMutexA
RtlUnwind
WinExec
crtdll
_fdopen
_open_osfhandle
_sleep
fclose
_cexit
malloc
printf
raise
setbuf
srand
strcat
strcpy
Exports
Exports
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84B - Virtual size: 84B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 188B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 828B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 188B - Virtual size: 188B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
.edata Size: 72B - Virtual size: 72B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ