e:\New_DepReader\release\DepReader_dooland_hook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23.exe
Resource
win10v2004-20240226-en
General
-
Target
44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23
-
Size
22.2MB
-
MD5
3195b2169360c862e1ab3f8f0f5d2941
-
SHA1
9edf80b572159625231f00735b6c938148565558
-
SHA256
44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23
-
SHA512
47b6696eb80bca5118ed7adcb4b672b9ff82aebe706b18ee91edcf25d6c0db83d23f2cba2c765918cf09c56a793f663c0a98a811d032ba2b41253d55ce24704a
-
SSDEEP
393216:+HMk7WphkFt0guLH1RefKTO7N267igTiHEvNqIrVi7fBScTSQDMRvZBVH3SNbbrM:+Sp0tab1aK67NZigOH8QoVYMsMRBBVHv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23
Files
-
44bdaf61dec4c00f4427c3181b9994ed019f65c98584aa1deb27accb908a4b23.exe windows:4 windows x86 arch:x86
f843f23372af25421e2c6baffc81591a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
wininet
InternetSetCookieA
InternetGetCookieA
kernel32
GlobalUnlock
MulDiv
lstrcmpW
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetModuleFileNameW
FileTimeToLocalFileTime
GetCurrentProcessId
InterlockedIncrement
GetThreadLocale
GetFileAttributesA
GetFileTime
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
SetErrorMode
GetSystemTimeAsFileTime
WaitForSingleObject
HeapAlloc
HeapReAlloc
VirtualAlloc
GetSystemInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalDeleteAtom
VirtualQuery
FlushInstructionCache
VirtualProtect
SetLastError
FileTimeToSystemTime
DuplicateHandle
GetFileType
WriteFile
GetVersion
CompareStringA
InterlockedExchange
CompareStringW
GetProcAddress
FormatMessageA
FreeLibrary
GetVolumeInformationA
SetPriorityClass
GetVersionExA
DeviceIoControl
GlobalFree
GlobalAlloc
CreateFileA
LocalFree
LocalAlloc
InterlockedDecrement
lstrcpyW
FindNextFileW
FindFirstFileW
CloseHandle
GetFullPathNameW
SetFilePointer
GetFileSize
ReadFile
CreateFileW
GetFileAttributesW
lstrlenW
GetLastError
CreateThread
GetCurrentProcess
SetProcessWorkingSetSize
WideCharToMultiByte
TerminateProcess
Sleep
LeaveCriticalSection
EnterCriticalSection
GetTickCount
IsDBCSLeadByte
MultiByteToWideChar
GetFullPathNameA
GetTempPathA
FreeResource
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
lstrlenA
FindClose
FindFirstFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
DeleteCriticalSection
InitializeCriticalSection
HeapFree
user32
UnregisterClassA
TranslateAcceleratorA
SetMenu
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
ReuseDDElParam
UnpackDDElParam
MoveWindow
SetWindowTextA
IsDialogMessageA
CharNextA
GetWindowThreadProcessId
ShowOwnedPopups
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessagePos
PeekMessageA
MapWindowPoints
GetMenuItemInfoA
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
IntersectRect
GetWindowPlacement
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
RegisterClipboardFormatA
GetWindow
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetMessageA
GetMessageTime
TranslateMessage
DispatchMessageA
FindWindowA
IsWindow
CharUpperA
MessageBoxA
LoadMenuA
LoadImageA
GetDC
DrawStateA
FillRect
DrawFocusRect
OffsetRect
GetSysColor
InflateRect
GetSysColorBrush
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
CopyAcceleratorTableA
ReleaseCapture
LoadCursorA
FrameRect
TrackPopupMenuEx
SetCapture
SetWindowRgn
IsRectEmpty
ScrollWindow
ShowWindow
SendMessageA
LoadIconA
CallWindowProcA
SetTimer
GetClientRect
GetSystemMetrics
SetWindowLongA
GetWindowLongA
SetLayeredWindowAttributes
InvalidateRect
GetWindowRect
UpdateWindow
IsIconic
DrawIcon
GetWindowDC
ReleaseDC
CopyRect
KillTimer
LoadBitmapA
PostMessageA
EnableWindow
wsprintfA
GetParent
SetWindowPos
PtInRect
ScreenToClient
SystemParametersInfoA
DestroyCursor
DestroyMenu
DestroyIcon
GetNextDlgTabItem
SetCursor
ClientToScreen
WindowFromPoint
GetActiveWindow
GetSubMenu
gdi32
ExtSelectClipRgn
CreatePatternBrush
GetDeviceCaps
CreatePen
GetBkColor
CreateEllipticRgn
LPtoDP
Ellipse
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetTextExtentPoint32A
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SelectObject
CreateBitmap
GetStockObject
DeleteObject
BitBlt
GetObjectA
CreateCompatibleDC
GetTextColor
CreateSolidBrush
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetPixel
CreateCompatibleBitmap
DeleteDC
SetTextColor
SetBkColor
OffsetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
DragQueryFileA
DragFinish
SHGetMalloc
ShellExecuteExA
comctl32
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoDisconnectObject
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
VariantClear
VariantInit
VariantChangeType
VariantCopy
SysAllocString
SysFreeString
VariantTimeToSystemTime
SysAllocStringByteLen
SysStringLen
OleCreateFontIndirect
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayDestroy
SystemTimeToVariantTime
LoadTypeLi
ws2_32
gethostbyname
htons
WSAStartup
socket
connect
closesocket
recv
send
inet_addr
Sections
.text Size: 400KB - Virtual size: 397KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21.7MB - Virtual size: 21.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ