mstext40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e871d92784dfa471746cf5bceae2018.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e871d92784dfa471746cf5bceae2018.dll
Resource
win10v2004-20240226-en
General
-
Target
2e871d92784dfa471746cf5bceae2018
-
Size
344KB
-
MD5
2e871d92784dfa471746cf5bceae2018
-
SHA1
a5e72287625fb89198dfcbd8399dcb9c16d950f3
-
SHA256
8beb3ce85c828709e599ae14865bb5614ec20c4a16c84975c355eb39682cc310
-
SHA512
729a1082d1b9031d9511012ccf30e595d805619a0ff93a3b24cf221cd917cc409cc6ad711d54dc07648403a9ea824a6e2923ad797ddbb9be7aa0bc95663d41fb
-
SSDEEP
6144:R7ZlkRKR+akndCtcXGBwrK8Pxx9OzovUeuM1oFX3iIUJpvMy0fMIGWm:JgRAlYbPxXAKmlWpvX0fMIGp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e871d92784dfa471746cf5bceae2018
Files
-
2e871d92784dfa471746cf5bceae2018.dll regsvr32 windows:4 windows x86 arch:x86
5bcfbb6e4ca799457a9e802e083d1406
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
kernel32
GetOEMCP
GetACP
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileTime
FindClose
GetLastError
CloseHandle
ReadFile
WriteFile
SetFilePointer
GetPrivateProfileStringA
GetCurrentProcessId
GetVersionExW
DisableThreadLibraryCalls
GetModuleFileNameA
LoadLibraryExA
WritePrivateProfileStringA
GetFileSize
LoadLibraryW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsValidCodePage
GetSystemDefaultLangID
GetVersionExA
FindNextFileA
FindNextFileW
GetLocaleInfoW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
GetTempPathA
GetTempPathW
GetFullPathNameA
GetFullPathNameW
GetFileAttributesA
GetFileAttributesW
FindFirstFileA
FindFirstFileW
GetUserDefaultLCID
GetModuleHandleW
GetDriveTypeA
CreateDirectoryA
SetLastError
CreateDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
RemoveDirectoryA
RemoveDirectoryW
SetCurrentDirectoryA
SetCurrentDirectoryW
LoadLibraryExW
HeapFree
HeapAlloc
GetProcAddress
GetCPInfo
InterlockedIncrement
InterlockedDecrement
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
OutputDebugStringA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
RaiseException
VirtualProtect
GetSystemInfo
VirtualQuery
GetConsoleCP
GetConsoleMode
InitializeCriticalSection
RtlUnwind
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
GetCommandLineA
msjet40
ord158
ord170
ord155
ord118
ord136
ord101
ord159
ord172
ord179
ord176
ord146
ord167
ord156
ord173
ord108
mswstr10
ord1
oleaut32
SysAllocStringLen
VarI2FromStr
SysFreeString
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SysAllocString
user32
CharUpperW
CharUpperA
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ