Static task
static1
Behavioral task
behavioral1
Sample
6f59f348109da9130062f2229146f150N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f59f348109da9130062f2229146f150N.dll
Resource
win10v2004-20240709-en
General
-
Target
6f59f348109da9130062f2229146f150N.exe
-
Size
15KB
-
MD5
6f59f348109da9130062f2229146f150
-
SHA1
1b6cff0a461ed4000221dd33ebb4a51f605540c6
-
SHA256
e46f5a72331a88d2a1d4f5cc3407cec9bfc544128e85ac15be5cad5a28548982
-
SHA512
64d441b5a70cb24cb8914cde1b1372e52b6f3a6080675561b22e88c9caa8586e44bb7fb0bf4ac42c9441ec41cc06a626ccd4bf4b77c6f6a8d3aa38c5a539e0c1
-
SSDEEP
96:T2oIOXj4EUGWsmecNVCEOIIrTkvTFsj/oufa1U1onEUZZrMFXxS/yz1d2rD5PVHo:tkvZCwBEUZZrQXk/yzkDvH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f59f348109da9130062f2229146f150N.exe
Files
-
6f59f348109da9130062f2229146f150N.exe.dll windows:4 windows x86 arch:x86
5d92fe1509f57bbf2ce6f80c95b7ca86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadProcessMemory
GetCurrentProcess
GetModuleFileNameA
GlobalFree
GlobalLock
VirtualProtectEx
GetModuleHandleA
GetComputerNameA
CreateThread
IsBadReadPtr
WriteProcessMemory
GlobalAlloc
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ