F:\myapp\CcRemote\bin\server\CcMainDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02DB8FDA0F42DFF7EF9E2E6873B7AFD5.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02DB8FDA0F42DFF7EF9E2E6873B7AFD5.dll
Resource
win10v2004-20240226-en
General
-
Target
02DB8FDA0F42DFF7EF9E2E6873B7AFD5.dll
-
Size
208KB
-
MD5
02db8fda0f42dff7ef9e2e6873b7afd5
-
SHA1
eb4f50e2f9d0664e54882d2173f9cdf0e59b5e5b
-
SHA256
69b9a78b0ca94a55b97b44af84b8eb47a1669a7ca29f626f38b1d5361c34ede5
-
SHA512
c9b328b91aa3c3cc23bb6f734998820a95de797c5d33421415dbf1861d3b1dd63da7e0bf6f3a5fe1a501863d89191c30246067297286967d075e60dba0f117b8
-
SSDEEP
6144:b1TyRICfzZQVG5zLD45eEhIv5KTBIUXuTyEAVa:bQRvfzZQVCHD4kEW5KTC0u2E3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02DB8FDA0F42DFF7EF9E2E6873B7AFD5.dll
Files
-
02DB8FDA0F42DFF7EF9E2E6873B7AFD5.dll.dll windows:6 windows x86 arch:x86
ecea502ae8d6b6cf637b892f3a6b808d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
shlwapi
SHDeleteKeyA
kernel32
HeapAlloc
GetLocalTime
CreateFileMappingA
GetProcessHeap
MapViewOfFile
LocalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GlobalSize
OutputDebugStringA
CreatePipe
GetStartupInfoA
TerminateProcess
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
lstrcmpiA
QueryDosDeviceA
K32GetProcessImageFileNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
CreateMutexA
SetErrorMode
OpenEventA
ReleaseMutex
FreeConsole
FlushFileBuffers
HeapSize
SetStdHandle
SetFilePointerEx
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
HeapFree
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileType
GetStdHandle
HeapReAlloc
LCMapStringW
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InterlockedFlushSList
RaiseException
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
MoveFileExA
GetTickCount
GetSystemDirectoryA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
SetLastError
GetModuleFileNameA
CreateDirectoryA
GetDiskFreeSpaceExA
WriteConsoleW
CreateProcessA
LocalReAlloc
RemoveDirectoryA
GetFileSize
LocalFree
GetLogicalDriveStringsA
DeleteFileA
CreateFileA
GetFileAttributesA
GetLastError
LocalAlloc
GetVolumeInformationA
FindClose
SetFilePointer
FindNextFileA
GetDriveTypeA
WriteFile
FindFirstFileA
MoveFileA
ReadFile
GetVersionExA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryA
lstrlenA
lstrcatA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
EnterCriticalSection
ResetEvent
lstrcpyA
Sleep
CancelIo
ResumeThread
CreateThread
WaitForSingleObject
SetEvent
CloseHandle
TerminateThread
CreateEventA
GetConsoleCP
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetConsoleMode
DecodePointer
UnmapViewOfFile
CreateFileW
GetCPInfo
user32
SetWindowsHookExA
GetKeyNameTextA
GetActiveWindow
CallNextHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
wsprintfA
SetCapture
WindowFromPoint
UnhookWindowsHookEx
keybd_event
MapVirtualKeyA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetClipboardData
GetSystemMetrics
GetCursorInfo
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowTextA
mouse_event
ReleaseDC
SetRect
CharNextA
GetDC
SetCursorPos
GetThreadDesktop
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CreateWindowExA
GetUserObjectInformationA
SetThreadDesktop
ExitWindowsEx
CloseDesktop
OpenDesktopA
OpenInputDesktop
InternalGetWindowText
IsWindow
ShowWindow
PostMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
GetDesktopWindow
gdi32
CreateDIBSection
SelectObject
DeleteDC
GetDIBits
CreateCompatibleBitmap
BitBlt
DeleteObject
CreateCompatibleDC
advapi32
RegOpenKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
RegQueryInfoKeyA
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
SetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
AddAccessAllowedAce
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCloseKey
RegQueryValueA
shell32
SHGetFileInfoA
winmm
waveInReset
waveOutWrite
waveInGetNumDevs
waveInOpen
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveInStop
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveOutClose
ws2_32
select
socket
ntohs
connect
recv
htons
setsockopt
WSAStartup
gethostbyname
closesocket
WSAIoctl
WSACleanup
gethostname
getsockname
send
imm32
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICOpen
ICSeqCompressFrame
ICSeqCompressFrameStart
Exports
Exports
FirstRun
MainRun
ServiceMain
TestFun
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ