e:\work\uplevel\release\uplevel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d6928f67d9204a6ef6fd4d7cde21c7f7.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6928f67d9204a6ef6fd4d7cde21c7f7.dll
Resource
win10v2004-20240226-en
General
-
Target
d6928f67d9204a6ef6fd4d7cde21c7f7
-
Size
124KB
-
MD5
d6928f67d9204a6ef6fd4d7cde21c7f7
-
SHA1
f1524e155f0a1798603e567c28457d9bd53bd4bf
-
SHA256
865fbcc05e6d7856e4420c5f238b147203b044ae9d96959f355dbb9a2d6e740f
-
SHA512
3899e279c71159b81f5e9a6273b5e2849b7807c8b70944db8c1cd5d42ce6d171de19157cc601b2acc6665c8f056ad659662e18c30f4bb32c37bff9b5c9e152dd
-
SSDEEP
3072:FIuPuRf2j5zfz+wnUA7QwAZoIcakClM7ruRJ6z5gt53y:eftSzfpnUA7QwAZfPM3uaFQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6928f67d9204a6ef6fd4d7cde21c7f7
Files
-
d6928f67d9204a6ef6fd4d7cde21c7f7.dll windows:4 windows x86 arch:x86
7a5569d2ebca3de55e2cac8ac0e2ae1c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Sleep
CloseHandle
CreateFileW
GetFileSize
ReadFile
GetSystemDirectoryA
CreateFileA
WriteFile
MoveFileExA
CreateThread
WaitForSingleObject
CreateEventW
SetEvent
GetCurrentProcessId
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ResetEvent
OpenProcess
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSection
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
user32
wsprintfW
ole32
OleInitialize
OleUninitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
dnsapi
DnsQuery_A
DnsRecordListFree
wininet
RetrieveUrlCacheEntryFileW
gdiplus
GdipFree
GdipAlloc
GdipDisposeImage
GdipCloneImage
GdipCreateBitmapFromFileICM
GdipSaveImageToFile
GdiplusShutdown
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
ws2_32
WSAStartup
send
recv
closesocket
connect
htons
socket
inet_addr
psapi
GetModuleFileNameExA
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ