MpDetours.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a78930cefea75e7defa289e61a5f829e89833ec1611e3d9a4bf290a20ffcc1c3.dll
Resource
win10v2004-20240226-en
General
-
Target
a78930cefea75e7defa289e61a5f829e89833ec1611e3d9a4bf290a20ffcc1c3
-
Size
311KB
-
MD5
226a53190a6c1aae2971b45081702f97
-
SHA1
3064a50100cced3f9d8ba70c33d24a1275c788cd
-
SHA256
a78930cefea75e7defa289e61a5f829e89833ec1611e3d9a4bf290a20ffcc1c3
-
SHA512
0e24022f0eb1b8202cb18863c8883efef65e1160b24384e32aba1e417bd8778113410ea7de26be4ea1ddf7bbf0e8fde28d814becd010c19dcb74b748bf3d81c2
-
SSDEEP
6144:ae+ybHJhhVxWIyrdQj/3qVGAQIRcYm7ufwF4Ue4i0gg26PQIBU:8yDJhHoXjfOLe4Xa8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a78930cefea75e7defa289e61a5f829e89833ec1611e3d9a4bf290a20ffcc1c3
Files
-
a78930cefea75e7defa289e61a5f829e89833ec1611e3d9a4bf290a20ffcc1c3.dll windows:10 windows x86 arch:x86
05fca3f31b1c54e9ed1a4f77489e884f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_invalid_parameter_noinfo_noreturn
_cexit
terminate
abort
_initterm
_initterm_e
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
api-ms-win-crt-string-l1-1-0
_wcsicmp
strcpy_s
towlower
advapi32
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
TraceMessage
kernel32
RtlUnwind
InterlockedFlushSList
RaiseException
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentThread
DecodePointer
IsProcessorFeaturePresent
SetThreadContext
FlushInstructionCache
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualProtect
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
Sleep
LoadLibraryExW
ResetEvent
WaitForSingleObjectEx
OpenProcess
WaitForSingleObject
SwitchToThread
VirtualLock
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GlobalFree
SetLastError
SystemTimeToFileTime
DeleteFileW
CreateFileW
GetFileSizeEx
CompareFileTime
HeapUnlock
HeapLock
GlobalUnlock
GlobalLock
OpenThread
GetProcessHeap
GetThreadContext
GetLastError
CreateToolhelp32Snapshot
ResumeThread
SuspendThread
GetCurrentThreadId
Thread32First
Thread32Next
GetProcessTimes
GetCurrentProcessId
GlobalAlloc
SetEvent
GetTickCount64
GetCurrentProcess
GetModuleHandleW
GetProcAddress
CloseHandle
CreateEventW
GetModuleFileNameW
FindStringOrdinal
TerminateProcess
ReleaseSemaphore
CreateSemaphoreW
VirtualQuery
ole32
OleFlushClipboard
ReleaseStgMedium
OleSetClipboard
DoDragDrop
user32
SendMessageTimeoutW
GetClipboardData
SetClipboardData
GetKeyboardLayout
GetUpdatedClipboardFormats
EnumClipboardFormats
CountClipboardFormats
EmptyClipboard
CloseClipboard
GetPriorityClipboardFormat
GetWindowThreadProcessId
IsClipboardFormatAvailable
GetClipboardOwner
GetClipboardSequenceNumber
winspool.drv
GetJobW
EndDocPrinter
SetJobW
StartPagePrinter
StartDocPrinterW
GetPrintExecutionData
GetPrinterW
EndPagePrinter
WritePrinter
shlwapi
StrStrIW
shell32
DragQueryFileW
ntdll
RtlNtStatusToDosError
RtlGetVersion
RtlEqualUnicodeString
api-ms-win-crt-heap-l1-1-0
_calloc_base
free
_free_base
_callnewh
malloc
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
__stdio_common_vsprintf
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 233KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ