c:\advlp\bin\Release\adshot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b502e285d74d03f39ca3605eb1c5e5cc.dll
Resource
win7-20240221-en
General
-
Target
b502e285d74d03f39ca3605eb1c5e5cc
-
Size
320KB
-
MD5
b502e285d74d03f39ca3605eb1c5e5cc
-
SHA1
a211631208bb403ee24668e9382b61d2d9c7d55c
-
SHA256
6cf2517a3d19104db1147bf2dcceda05dfbd2d6ca88c3b00664acf9a663986c3
-
SHA512
eb0e224077cb3518b63f21c7f6dc9012de961ed3c4188ca2ebdace03184aa5809f1db088757a8fec3e4f8b2d82c88de618cd153a285c5ed60ca21fd0184086a6
-
SSDEEP
6144:IS0SVBuULascjx110y2C30Jbsdd7VSgLqPM0RB39FBk:IS0SVBpLwt6C30xSLqPMOBk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b502e285d74d03f39ca3605eb1c5e5cc
Files
-
b502e285d74d03f39ca3605eb1c5e5cc.dll regsvr32 windows:4 windows x86 arch:x86
7d29ca80d04d6cb68b41b4da854ddcf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FlushFileBuffers
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrlenA
lstrcpyA
GetModuleFileNameA
lstrcatA
Sleep
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
GetModuleHandleA
lstrcpynA
IsDBCSLeadByte
CompareStringA
CompareStringW
GetEnvironmentVariableA
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentThreadId
WaitForSingleObject
GetTickCount
ReleaseMutex
SetEvent
ResetEvent
CloseHandle
CreateMutexA
CreateEventA
ReadFile
GetFileSize
CreateFileA
CreateDirectoryA
SetEnvironmentVariableA
FileTimeToLocalFileTime
GetSystemInfo
GetComputerNameA
IsBadReadPtr
CreateMemoryResourceNotification
WriteProfileSectionA
EscapeCommFunction
ResumeThread
CreateThread
FileTimeToSystemTime
WriteFile
GetFileTime
GetCurrentProcess
GetVolumeInformationA
SetStdHandle
SetFilePointer
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
LocalAlloc
LocalFree
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
VirtualQuery
RtlUnwind
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GetOEMCP
oleaut32
GetErrorInfo
SafeArrayCreate
SafeArrayCopy
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
DispCallFunc
SysStringLen
LoadRegTypeLi
VariantChangeType
VarUI4FromStr
VariantInit
VarBstrCmp
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VariantClear
UnRegisterTypeLi
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Run
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ