DllRegisterServer
Overview
overview
8Static
static
DE4.zip
windows10-2004-x64
1Details9473.zip
windows10-2004-x64
1Details9473.iso
windows10-2004-x64
3Details.lnk
windows10-2004-x64
8disallowab...ly.dll
windows10-2004-x64
1disallowable/plod.txt
windows10-2004-x64
1disallowab...es.txt
windows10-2004-x64
1disallowab...se.cmd
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
DE4.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Details9473.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Details9473.iso
Resource
win10v2004-20220901-en
Behavioral task
behavioral4
Sample
Details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
disallowable/debatingly.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
disallowable/plod.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
disallowable/replicates.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral8
Sample
disallowable/revise.cmd
Resource
win10v2004-20220812-en
General
-
Target
DE4.zip
-
Size
383KB
-
MD5
d5561faad1c38e5f4d85b12ca15c3d0e
-
SHA1
320027181ab1d3fe9c7cc5f77ea4420b3dec7a29
-
SHA256
73d92cce0c34cefb29268f78e91b8f8a8eebc1d5b9c2604a1505e100db56864f
-
SHA512
9a4f415c94e7884de83e41f1cb3c00063ee7783650706ed2e7a09105b110c7da2a1eafc681ae60a99bbba046af3d57ddb2c872b2fd9030eaa804f9e2a3d41738
-
SSDEEP
6144:TBehAiiJz8ZfZ5KI7GuviWSFMUyvfJOksgcVjr7lT:8NiJzUK7E4hyZCgcVjflT
Malware Config
Signatures
Files
-
DE4.zip.zip
Password: PG1
-
Details9473.zip.zip
Password: PG1
-
Details9473.iso.iso
Password: PG1
-
Details.lnk.lnk
-
disallowable/debatingly.dat.dll regsvr32 windows x86
Password: PG1
fae84ade86333bc16f134b64e603e945
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
HeapCreate
CreateNamedPipeA
LockFile
PeekNamedPipe
GetCurrentThreadId
HeapWalk
GetModuleHandleA
SetCurrentDirectoryA
GetCommandLineA
GetFileInformationByHandle
CallNamedPipeA
GetLastError
CreateFileA
GetCurrentThread
DeleteFileA
CloseHandle
CreateThread
GetWindowsDirectoryA
UnlockFile
GetProcAddress
GetFileSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
DecodePointer
CreateFileW
RaiseException
Exports
Exports
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
disallowable/plod.txt
-
disallowable/replicates.txt
-
disallowable/revise.cmd