d:\projecte\sdk\ShuttlePro-5.52(NewHB04B)-2021.10.11\Release\MachDevice.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c.dll
Resource
win10v2004-20231215-en
General
-
Target
eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c
-
Size
588KB
-
MD5
bf29481ab198c66e3ee8e408b057a19d
-
SHA1
cfc09f48bcd0ba94c8b7375ac271b9205aa5f8f4
-
SHA256
eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c
-
SHA512
d88177798f2d47cd9ad1bdae596c6e33a0c0d16f30f506d8da9325e73d9ee1b22c4507714a0368728ce3f4bd8a1d4bf7baeeef7bc44b7753113f732b69013068
-
SSDEEP
6144:c+ePCnla6oVGDcbQUOwxFgJszqXB8t3mGYh/4tnnPtbT87AsMu4:c+eas5VKYoXB80GY14tnZQ7AsMu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c
Files
-
eff70f7a47539296a44b5aaf0265ecf7990b7a2b6b963bf3413534490da7499c.dll regsvr32 windows:4 windows x86 arch:x86
62fa2a0b1fb2d9762120595ea54be20a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
hid
HidD_SetFeature
HidD_GetHidGuid
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapFree
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ResumeThread
CreateThread
Sleep
CloseHandle
SetThreadPriority
GetCurrentThread
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
FindResourceA
SizeofResource
LockResource
LoadResource
WideCharToMultiByte
GetSystemTime
GetTickCount
CreateFileA
GetLastError
CancelIo
ReadFile
GetOverlappedResult
GetVersion
MultiByteToWideChar
GlobalFlags
WritePrivateProfileStringA
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
lstrlenW
lstrcmpiA
DeleteCriticalSection
RaiseException
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
GlobalFree
MulDiv
lstrlenA
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
InterlockedDecrement
SetLastError
InterlockedIncrement
GlobalAddAtomA
GetCurrentThreadId
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
GetEnvironmentStringsW
user32
DrawTextA
TabbedTextOutA
ClientToScreen
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
DestroyMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowLongA
SetWindowPos
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
wsprintfA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
LoadCursorA
GetSysColorBrush
EndPaint
GetMenu
BeginPaint
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostMessageA
PostQuitMessage
MessageBeep
RegisterDeviceNotificationA
SendMessageA
EnableWindow
KillTimer
ReleaseDC
GetDC
GrayStringA
CallWindowProcA
DrawTextExA
SystemParametersInfoA
gdi32
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
SetViewportExtEx
CreateBitmap
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
ole32
CoCreateInstance
StringFromGUID2
oleaut32
SysAllocString
SysFreeString
VarBstrCmp
SysAllocStringLen
VariantClear
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantChangeType
VariantInit
ws2_32
WSACleanup
WSAStartup
Exports
Exports
Config
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DoDwell
Home
InitControl
JogOff
JogOn
PostInitControl
Probe
Purge
Reset
SetCode
SetDoButton
SetGetDRO
SetGetLED
SetProName
SetSetDRO
SetSetLED
StopPlug
Update
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ