dprx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a0cd3d385d6855e69ab291b63118420b.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a0cd3d385d6855e69ab291b63118420b.dll
Resource
win10v2004-20240221-en
General
-
Target
a0cd3d385d6855e69ab291b63118420b
-
Size
300KB
-
MD5
a0cd3d385d6855e69ab291b63118420b
-
SHA1
45ed8ef6d28d58deac35dd51cef221a2a890309e
-
SHA256
92030c2586f7950dd250b1bf9151b6ba21fefeda3a066812357f7edfeb34faa2
-
SHA512
6863f0f9e26704231d7fb4c437a3224e441422061c7d11175c8cc85f9bd4d7d2f4c3d524d9fdea62e1e83204f49f2c989d76092c379034f5443eb99650a80cff
-
SSDEEP
6144:7F+3qPRDvylUGAblZw2m+7vKxrEL6uEgGkoCgGtoCVV:7F+3qPRDPGGlZ7m8vKlE5EgGkoCgGtoc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0cd3d385d6855e69ab291b63118420b
Files
-
a0cd3d385d6855e69ab291b63118420b.dll regsvr32 windows:4 windows x86 arch:x86
7872e97a9b4cf0621ce19e50c52943cf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
proxy
?Close@CProxy@@QAEXXZ
?SynchronizeTime@CProxy@@QAEJPAG@Z
?SendRemoteHttpRequest@CProxy@@QAEJPAGJPAUtagVARIANT@@1J10@Z
??1CProxy@@QAE@XZ
??0CProxy@@QAE@XZ
?LoadDll@CProxy@@QAEJPBG@Z
?Open@CProxy@@QAEJHPAX@Z
?GeoLocate@CProxy@@QAEJXZ
kernel32
HeapAlloc
HeapFree
GetProcessHeap
ProcessIdToSessionId
LocalAlloc
OpenProcess
SetSystemTime
SetEvent
ResetEvent
CancelIo
WaitForMultipleObjects
CreateEventW
DuplicateHandle
TerminateThread
GetExitCodeThread
Sleep
FindClose
FindNextFileW
CreateFileW
FindFirstFileW
lstrcpyW
GetSystemTimeAsFileTime
GetTempPathW
FileTimeToSystemTime
GetTickCount
SetThreadPriority
GetCurrentThreadId
GetFileAttributesExW
GetFileTime
CompareFileTime
DeleteFileW
GetTempFileNameW
SetLastError
ReadFile
GetFileSize
MoveFileExW
FlushFileBuffers
WriteFile
SetFileAttributesW
ReleaseSemaphore
InterlockedExchangeAdd
UnmapViewOfFile
MapViewOfFile
lstrcatW
SetFilePointer
GlobalAlloc
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpynW
CreateFileA
CreateFileMappingW
OpenFileMappingW
lstrcpynA
GetSystemTime
CreateDirectoryW
CreateMutexA
GlobalSize
SetFileTime
WriteConsoleA
SetStdHandle
GetCurrentThread
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ReleaseMutex
CreateMutexW
FindResourceExW
LockResource
DisableThreadLibraryCalls
lstrlenA
LoadLibraryW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
GetLastError
GetModuleFileNameW
GetSystemDirectoryW
lstrcmpiW
WaitForSingleObject
lstrcatA
CreateEventA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
GetModuleHandleW
GetProcAddress
GetCurrentProcess
FreeLibrary
GetVersionExW
GetComputerNameW
lstrlenW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
HeapCreate
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleA
VirtualProtect
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
LoadLibraryA
VirtualFree
VirtualAlloc
RtlUnwind
ExitThread
user32
UnregisterClassA
CharLowerW
CharNextW
KillTimer
SetTimer
GetWindowThreadProcessId
IsWindow
CharLowerBuffW
GetDesktopWindow
SendMessageW
RegisterWindowMessageW
PostMessageW
advapi32
RegSetValueExW
RegOpenKeyExW
ConvertSidToStringSidW
LookupAccountNameW
ConvertStringSidToSidW
SetNamedSecurityInfoW
CryptDeriveKey
CryptDecrypt
CryptEncrypt
GetSidSubAuthorityCount
GetSidSubAuthority
CryptDestroyKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
IsValidSid
DuplicateTokenEx
SetTokenInformation
ImpersonateLoggedOnUser
OpenThreadToken
RevertToSelf
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
shell32
SHCreateDirectoryExW
SHGetFolderPathW
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoTaskMemFree
CoInitializeEx
GetHGlobalFromStream
StringFromCLSID
oleaut32
SafeArrayDestroy
SafeArrayPutElement
SafeArrayGetElement
VarI4FromStr
SafeArrayCreate
SafeArrayUnaccessData
SysStringByteLen
SysAllocStringByteLen
SafeArrayRedim
VariantInit
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
VarBstrFromI4
VarBstrFromR8
SysAllocString
SysAllocStringLen
SysStringLen
VarBstrCat
SysFreeString
VarBstrCmp
SafeArrayCreateVector
VariantClear
SafeArrayAccessData
shlwapi
SHCreateStreamOnFileW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
rpcrt4
UuidCreate
iphlpapi
NotifyAddrChange
wtsapi32
WTSCloseServer
WTSQuerySessionInformationW
WTSOpenServerW
WTSFreeMemory
netapi32
NetWkstaUserEnum
NetApiBufferFree
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ