C:\Users\Administrator\Desktop\Logitech-Webservice\assets\temp\temp-53793229197705\LogitechStep1\x64\Release\DjzMOSIoEIiNwW0FDx0xg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e.dll
Resource
win10v2004-20240226-en
General
-
Target
6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e
-
Size
113KB
-
MD5
3a6da5ef4e5854d5b021af36391d132b
-
SHA1
e8f2ab3aa97a43b3dddc5f677c40ce863495671e
-
SHA256
6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e
-
SHA512
0dcb59b21c050b5ad35aee12a54865a83c44774aad4959966f24d297bab16c8e9b6449a4e5e4f122dea8d0e3496120c5876a264680caba0a6ae1b0d1422b165b
-
SSDEEP
3072:VAFarXLqJl9dGXoWJh1Fm3zBKvIaTw/7qop/ciB:VAFanqJl9daoC63zkvRU+YcQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e
Files
-
6e08f626885ed39762d67550281c1671dd0d6e2997d4ffc91f08a53dd4d99b8e.dll windows:6 windows x64 arch:x64
9494ba3a60c01b4daddfb3323249537f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateDirectoryW
GetTempPathW
Sleep
lstrcatW
lstrcpyW
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
user32
wsprintfW
shell32
ShellExecuteW
urlmon
URLDownloadToFileW
Exports
Exports
somGuZzGRbEATEPeDAXm
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ