ACPlugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04e6a78bec09791767edbcfbd8c5c010cdec58bd410db696c75f7fc4ac4fc140.dll
Resource
win7-20231129-en
General
-
Target
04e6a78bec09791767edbcfbd8c5c010cdec58bd410db696c75f7fc4ac4fc140
-
Size
97KB
-
MD5
53be458a9216a8afca49f788e2957052
-
SHA1
da10b3e1ea37297bdb682d8ac4bd3120ecd066e8
-
SHA256
04e6a78bec09791767edbcfbd8c5c010cdec58bd410db696c75f7fc4ac4fc140
-
SHA512
f4cabab5821f2dec9f4151979c07086a2e481f6030bcb9d5d84ac5dc68e8a2024d9125f333dd0d097f434dac71f55b6b372e2f630d6d333d3ee22de0e7c2041c
-
SSDEEP
3072:nVDgUtSVfR6zgw8P0BGMMUo3MH+N4lLKC:nhzEfR6zr8PrcmCa4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04e6a78bec09791767edbcfbd8c5c010cdec58bd410db696c75f7fc4ac4fc140
Files
-
04e6a78bec09791767edbcfbd8c5c010cdec58bd410db696c75f7fc4ac4fc140.dll regsvr32 windows:5 windows x86 arch:x86
22f90eb99671ecb651a155cb23eb7b2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_except_handler3
??3@YAXPAX@Z
_wunlink
wcslen
wcsrchr
memset
wcscat
wcscpy
_wcsicmp
wcscmp
swprintf
_snwprintf
wcschr
_wmakepath
_wsplitpath
free
_onexit
__dllonexit
_adjust_fdiv
_initterm
wcsncpy
_purecall
malloc
??2@YAPAXI@Z
realloc
kernel32
HeapSize
HeapReAlloc
HeapDestroy
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
CompareStringW
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
CloseHandle
GetLastError
CreateProcessW
GetModuleFileNameW
GetCurrentThreadId
SetLastError
lstrlenW
WriteFile
CreateFileW
FindClose
GetTempPathW
SizeofResource
LockResource
LoadResource
FindResourceW
lstrcmpiW
lstrcpyW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpynW
lstrcatW
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
LoadLibraryW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FindNextFileW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
VirtualFree
VirtualAlloc
FindFirstFileW
GetSystemDefaultLCID
GetUserDefaultLCID
GetModuleHandleW
GetFileAttributesW
GetTempFileNameW
GetVersionExA
GetSystemTimeAsFileTime
user32
RegisterWindowMessageA
ShowWindow
PostMessageW
BeginPaint
GetClientRect
FillRect
EndPaint
CallWindowProcW
GetWindowLongW
CreateWindowExW
RegisterClassExW
DefWindowProcW
DrawTextW
CharNextW
LoadCursorW
wsprintfW
GetClassInfoExW
SetWindowLongW
UnregisterClassW
DestroyWindow
advapi32
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
gdi32
CreateSolidBrush
DeleteObject
ole32
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VarUI4FromStr
RegisterTypeLi
SysFreeString
SafeArrayAccessData
SafeArrayGetUBound
UnRegisterTypeLi
SafeArrayGetLBound
SafeArrayGetDim
SysAllocString
LoadTypeLi
shlwapi
PathFindExtensionW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE