c:\Practice\Teach\696_too\Warm\Friend\distant.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a17de50fcd71c572f423c943f926c2a9.dll
Resource
win7-20240221-en
General
-
Target
a17de50fcd71c572f423c943f926c2a9
-
Size
504KB
-
MD5
a17de50fcd71c572f423c943f926c2a9
-
SHA1
bd34e4d57bfc1938ebc93d8f404dbe7e019db0cf
-
SHA256
e4a5317a1b7c1ab91bb131dba5fea06fdb89e38c291e17f71b5c1634cfddecbe
-
SHA512
4fb4b5c2af8e3199d2ad51f67739da48f8363f7a5b7446dd496d8b58c90d1949bc49e841ff48baf99da92a88cddf22258bf48217bfbe889bdd9ad8b0c9257199
-
SSDEEP
12288:B7wAjlh98sQ73RBgy6aqGT8jSXxhYb/iWVEJ10mVSV/+K/BCz7uW:B7wAQsQ735TYb/qhVSk3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a17de50fcd71c572f423c943f926c2a9
Files
-
a17de50fcd71c572f423c943f926c2a9.dll windows:4 windows x86 arch:x86
241e3141afa42b2aa84ab0b3655f0b1e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
MoveFileExW
GetCurrentProcessId
GetFileTime
GetModuleFileNameW
CreateProcessW
VirtualProtectEx
GetSystemDirectoryW
SetEndOfFile
ReadFile
LoadLibraryA
CreateFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSection
MultiByteToWideChar
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryW
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
DebugBreak
DeleteCriticalSection
HeapValidate
IsBadReadPtr
RaiseException
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetLastError
FlushFileBuffers
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FatalAppExitA
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
CloseHandle
GetModuleFileNameA
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetFilePointer
user32
GetMessageA
CloseClipboard
EndDialog
OffsetRect
ReleaseCapture
LoadIconW
BeginDeferWindowPos
DeferWindowPos
CreateMenu
UnregisterHotKey
LoadCursorW
TranslateMessage
RegisterWindowMessageW
msacm32
acmDriverDetailsW
acmDriverEnum
acmDriverID
acmDriverMessage
acmDriverOpen
acmDriverPriority
acmDriverRemove
acmFilterTagDetailsW
acmFilterTagEnumW
acmFormatChooseW
acmFormatDetailsW
acmFormatEnumW
acmFormatSuggest
acmFormatTagDetailsW
acmFormatTagEnumW
acmGetVersion
acmStreamOpen
acmStreamPrepareHeader
acmStreamReset
Exports
Exports
Rathermay
Wide
Sections
.text Size: 352KB - Virtual size: 350KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ