D:\a\ExplorerPatcher\ExplorerPatcher\build\Release\ExplorerPatcher.IA-32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2.dll
Resource
win10v2004-20240226-en
General
-
Target
b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2
-
Size
227KB
-
MD5
1a759ca5fd0a2909e4cd7667001741a0
-
SHA1
9d81c64baf13479d08a1972be708858d98c5d4c4
-
SHA256
b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2
-
SHA512
b89f62f4a18ab2add8c1df7faf07ce9bc9e8bcbfcf1ba073765132616ae2d5ebdbbc676861e06207116acf6c3d82c78e42c2e042ff831686c134317751b4cd13
-
SSDEEP
6144:SBo8lWsLt9yn2DNwcoQAmwAj6BV+UdvrEFp7hKLeElC:Se4WsLt9hNoE/j6BjvrEH7A0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2
Files
-
b40804861ae002f81e3af5c5ba8ded991373540c330aa10843dfecc9d8992be2.dll windows:6 windows x86 arch:x86
b1f3a934e1cd837495e940fbc12a2914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetWindowsDirectoryW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
QueryFullProcessImageNameW
AllocConsole
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WriteConsoleW
HeapSize
GetStringTypeW
FlushFileBuffers
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateThread
FindFirstFileExW
FindClose
HeapReAlloc
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
ReadFile
SetEndOfFile
SetStdHandle
MultiByteToWideChar
GetConsoleMode
GetConsoleOutputCP
WriteFile
GetStdHandle
LCMapStringW
HeapFree
LoadLibraryW
FreeConsole
CloseHandle
DisableThreadLibraryCalls
SetEvent
GetLastError
CreateEventW
OpenProcess
GetSystemDirectoryW
CompareStringOrdinal
GetModuleFileNameW
GetModuleHandleExW
HeapAlloc
ExitProcess
DecodePointer
GetFileType
CreateFileW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
VirtualProtect
FindNextFileW
CreateDirectoryW
EncodePointer
InterlockedFlushSList
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
user32
GetParent
SystemParametersInfoW
RegisterWindowMessageW
GetAncestor
GetWindowTextW
InvalidateRect
SendMessageW
RedrawWindow
GetWindowLongW
GetMenuItemInfoW
GetClassWord
PostMessageW
FindWindowExW
GetWindowRect
GetPropW
GetMenuItemCount
CreateWindowExW
RemovePropW
TrackPopupMenu
SetMenuItemInfoW
EnumPropsA
MapWindowPoints
SendNotifyMessageW
SetPropW
FindWindowW
GetClassNameW
SetWindowLongW
GetSystemMetricsForDpi
advapi32
AllocateAndInitializeSid
RegGetValueW
RegOpenKeyExW
CheckTokenMembership
RegNotifyChangeKeyValue
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
FreeSid
shell32
SHGetFolderPathW
ole32
CoCreateInstance
shlwapi
PathFileExistsW
PathStripPathW
uxtheme
SetWindowThemeAttribute
comctl32
ord410
ord412
ord413
dwmapi
DwmExtendFrameIntoClientArea
DwmSetWindowAttribute
dbghelp
ImageDirectoryEntryToDataEx
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ