Static task
static1
Behavioral task
behavioral1
Sample
f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623N.dll
Resource
win10v2004-20240802-en
General
-
Target
f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623N
-
Size
40KB
-
MD5
09c250c9b8d89e8d14b2eb78a27b4b00
-
SHA1
ebc76adde4cb50ef490a3704f601c4518e6bc4d0
-
SHA256
f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623
-
SHA512
d11f3eb45ff2d2be3d34a3f231f22ab8166257b3bf2651a0179326ea6d8bbba14451ed876411dd6a4b7742da35dc796fb9e7606c4d595acdb98e2639d5c1178f
-
SSDEEP
768:tVhiVTX846gLRfaV4LE31sOjmIH+Xqns/zAZLo:rbVgLRhLoHRHkqOAS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623N
Files
-
f45099075092149850194b37c40d2857fa9ae24b5db0719fdf469c800ea7c623N.dll windows:5 windows x86 arch:x86
fb87e74767c85c2aa93187aee333079a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
QueryPerformanceCounter
VirtualAlloc
GetStartupInfoA
ReadFile
GetModuleHandleW
GetModuleFileNameW
CloseHandle
GetCurrentThreadId
GetCurrentProcess
GetCommandLineW
ExitProcess
CreateProcessW
user32
GetScrollRange
DrawTextA
gdi32
SetLayout
TranslateCharsetInfo
TextOutA
CloseMetaFile
CopyMetaFileA
CreateFontIndirectA
CreateMetaFileA
DeleteObject
GetDeviceCaps
GetLayout
SetWindowOrgEx
GetTextExtentPoint32A
PatBlt
SelectObject
SetBkColor
SetBkMode
GetStockObject
SetTextAlign
SetTextColor
SetWindowExtEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegOpenKeyW
RegSetValueA
shell32
DragFinish
DragAcceptFiles
DragQueryFileA
ShellExecuteExA
ShellAboutA
ExtractAssociatedIconA
wininet
CreateUrlCacheEntryA
DeleteUrlCacheEntry
CommitUrlCacheEntryA
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_vsnprintf
exit
memmove
strchr
Sections
.text4 Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 868B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ