Static task
static1
Behavioral task
behavioral1
Sample
00c003a0a74b038d023c30e4d4f49252c054e3e367b6a6dbfc721081d75592ed.dll
Resource
win7-20240220-en
General
-
Target
00c003a0a74b038d023c30e4d4f49252c054e3e367b6a6dbfc721081d75592ed
-
Size
162KB
-
MD5
f017a97c8116075e5c0a0fa136205e8f
-
SHA1
e2115c605425c1c0b1eb638fbdeec9e7ac3c6c5e
-
SHA256
00c003a0a74b038d023c30e4d4f49252c054e3e367b6a6dbfc721081d75592ed
-
SHA512
afd1d68e86d4893c068249692e99655ba875afefff0dbc6cac1a23da8ed8624944a16dd58d9f5ac7ccb88f8b7dd5f7e34583b82d3e98a1af3081814c05a0bfd0
-
SSDEEP
3072:ZmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:ILc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 00c003a0a74b038d023c30e4d4f49252c054e3e367b6a6dbfc721081d75592ed
Files
-
00c003a0a74b038d023c30e4d4f49252c054e3e367b6a6dbfc721081d75592ed.dll windows:5 windows x86 arch:x86
987b9d7dc84d935c3675da82d40e06f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
DragDetect
TranslateMessage
EnumDisplayDevicesW
GetMenuState
kernel32
GetSystemDefaultUILanguage
GetPriorityClass
GetModuleHandleW
OutputDebugStringA
LoadLibraryA
CloseHandle
LoadLibraryExA
wintrust
CryptCATAdminCalcHashFromFileHandle
gdi32
OffsetClipRgn
advapi32
RegLoadAppKeyW
CloseEncryptedFileRaw
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 121KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ