Static task
static1
Behavioral task
behavioral1
Sample
e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9N.dll
Resource
win10v2004-20240802-en
General
-
Target
e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9N.exe
-
Size
36KB
-
MD5
8fbe07b70ceb93903d2aa89c38cfcbc0
-
SHA1
7131a2b11904d2176eddee71b9eda102c6e469bb
-
SHA256
e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9
-
SHA512
9719aaa6ed103daefb4d58d306bb2db24613db57b49baa9ca43f2a1c5ccf92cf7936ad83c66160cfa224c9274ea7cb1b262311bccd227323bfc0322e97382f6f
-
SSDEEP
384:UA8VDM0g7rBuhL1pKjQstosnqFnr14fD/l5Hn60FSA0A8lubbL6gRJNIaAVFREP:Ulg0gPtT4IHnvSA0A3bbL68AVF0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9N.exe
Files
-
e21eaf23d87c13412421e427391e99c096e2f192e3ec995dab4b7428e728d4c9N.exe.dll windows:4 windows x86 arch:x86
4af00119e0f1241831a2ac6ed8309161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
closesocket
gethostname
ntdll
_strupr
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
kernel32
UnmapViewOfFile
WideCharToMultiByte
MapViewOfFile
IsBadReadPtr
CreateFileMappingA
lstrcmpA
WritePrivateProfileStringA
TerminateThread
Sleep
LeaveCriticalSection
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
InitializeCriticalSection
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetPrivateProfileIntA
user32
SetTimer
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
wsprintfA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ole32
StringFromGUID2
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ