pdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b515fcecac6a6ec511f57d584535409e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b515fcecac6a6ec511f57d584535409e.dll
Resource
win10v2004-20240226-en
General
-
Target
b515fcecac6a6ec511f57d584535409e
-
Size
100KB
-
MD5
b515fcecac6a6ec511f57d584535409e
-
SHA1
4c0dbd4500437f3b5ccef31036bd28376d88b3ed
-
SHA256
1f5ed12e90ef5995181a131c851b095618e00aec0b43b117d397085a075ccc58
-
SHA512
6630219129023de3fb29a691f810a8d74fd78993f0ed6aff55bd030b88fa1d09e63dac35394a378ecbff25cb722232b7491457095c6801e90992744bfe724640
-
SSDEEP
3072:y5oYQfHg7tUY/IFQc1abEsJmiDo92/tNojdlNNi:yKRktnPEAq2/LohE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b515fcecac6a6ec511f57d584535409e
Files
-
b515fcecac6a6ec511f57d584535409e.dll windows:4 windows x86 arch:x86
3e2982220984e765b16ec8f55c586e6a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TlsGetValue
lstrcmpA
GetCurrentThreadId
DeleteCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
FreeEnvironmentStringsW
GetStdHandle
TlsFree
GetOEMCP
QueryPerformanceCounter
WideCharToMultiByte
LocalAlloc
LCMapStringA
VirtualFree
InterlockedIncrement
MapViewOfFile
LoadLibraryA
HeapReAlloc
GetDiskFreeSpaceA
VirtualProtect
GetFileType
CreateFileMappingW
EnterCriticalSection
CreateMutexW
UnmapViewOfFile
DeleteFileA
InterlockedExchange
GetSystemInfo
SetHandleCount
GetProcAddress
GetTickCount
DeleteFileW
GetVersionExA
CloseHandle
SetFilePointer
SetFileTime
TlsAlloc
IsDBCSLeadByte
WaitForSingleObject
Sleep
GetFullPathNameW
ReleaseMutex
SetLastError
CreateFileW
CompareFileTime
GetLocaleInfoA
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateThread
HeapFree
GetDiskFreeSpaceW
HeapDestroy
InterlockedDecrement
GetCPInfo
HeapCreate
GetSystemTimeAsFileTime
SetEndOfFile
CreateFileMappingA
WriteFile
CreateMutexA
FreeEnvironmentStringsA
TerminateProcess
GetStringTypeExA
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
VirtualAlloc
MoveFileA
MoveFileW
FlushViewOfFile
GetACP
SetUnhandledExceptionFilter
FreeLibrary
lstrlenW
GetEnvironmentStrings
HeapAlloc
lstrlenA
GetEnvironmentVariableA
OpenFileMappingA
InitializeCriticalSection
lstrcmpiA
LeaveCriticalSection
CreateEventA
VirtualQuery
GetStringTypeW
GetFullPathNameA
CreateFileA
GetEnvironmentStringsW
GetFileSize
GetStringTypeA
GetStartupInfoA
LocalFree
OpenFileMappingW
IsBadReadPtr
SetEvent
EnumDateFormatsExA
Exports
Exports
pyspauvs
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ