pdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cdd751004eb1e63b9b24d95d85c9c654.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdd751004eb1e63b9b24d95d85c9c654.dll
Resource
win10v2004-20240226-en
General
-
Target
cdd751004eb1e63b9b24d95d85c9c654
-
Size
72KB
-
MD5
cdd751004eb1e63b9b24d95d85c9c654
-
SHA1
774396797049097d2daa57ba16aedafaeeec0dec
-
SHA256
fc3e650139e550edc6004c24f709f60e0cea227baabc139bbbe5c5b77a9c5c3e
-
SHA512
2b059e9e849893f2b0321f21c6aa64849627e4de3f611d5bd08f50cbf6ea8c242b60479f26a905206749e07db56b1a2f467e74f7cf47ebaee68212bdd3833eba
-
SSDEEP
768:dH656XGgEqqUiRagYRWjyLV0qPjCQ0zAuU52en/0XegLcA45ilLMIpNiWjPVN:w6GqiagwWjapjclk2en4cAplYIpNieV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdd751004eb1e63b9b24d95d85c9c654
Files
-
cdd751004eb1e63b9b24d95d85c9c654.dll windows:4 windows x86 arch:x86
b119c80d960d40926dbff2237d8d2451
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TlsGetValue
lstrcmpA
GetCurrentThreadId
DeleteCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
FreeEnvironmentStringsW
GetStdHandle
TlsFree
GetOEMCP
QueryPerformanceCounter
WideCharToMultiByte
LocalAlloc
LCMapStringA
VirtualFree
InterlockedIncrement
MapViewOfFile
LoadLibraryA
HeapReAlloc
GetDiskFreeSpaceA
VirtualProtect
GetFileType
CreateFileMappingW
EnterCriticalSection
CreateMutexW
UnmapViewOfFile
DeleteFileA
InterlockedExchange
GetSystemInfo
SetHandleCount
GetProcAddress
GetTickCount
DeleteFileW
GetVersionExA
CloseHandle
SetFilePointer
SetFileTime
TlsAlloc
IsDBCSLeadByte
WaitForSingleObject
Sleep
GetFullPathNameW
ReleaseMutex
SetLastError
CreateFileW
CompareFileTime
GetLocaleInfoA
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateThread
HeapFree
GetDiskFreeSpaceW
HeapDestroy
InterlockedDecrement
GetCPInfo
HeapCreate
GetSystemTimeAsFileTime
SetEndOfFile
CreateFileMappingA
WriteFile
CreateMutexA
FreeEnvironmentStringsA
TerminateProcess
GetStringTypeExA
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
VirtualAlloc
MoveFileA
MoveFileW
FlushViewOfFile
GetACP
SetUnhandledExceptionFilter
FreeLibrary
lstrlenW
GetEnvironmentStrings
HeapAlloc
lstrlenA
GetEnvironmentVariableA
OpenFileMappingA
InitializeCriticalSection
lstrcmpiA
LeaveCriticalSection
CreateEventA
VirtualQuery
GetStringTypeW
GetFullPathNameA
CreateFileA
GetEnvironmentStringsW
GetFileSize
GetStringTypeA
GetStartupInfoA
LocalFree
OpenFileMappingW
IsBadReadPtr
SetEvent
EnumDateFormatsExA
InterlockedCompareExchange
msvcrt
malloc
free
_initterm
_amsg_exit
_adjust_fdiv
_except_handler4_common
_XcptFilter
Exports
Exports
jofxclzlk
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ