C:\Users\test\Desktop\GOTOBJ\mm\mm\DDD-20210418\SKEYE\Release\HOLLOWING.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8.dll
Resource
win10v2004-20240226-en
General
-
Target
2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8
-
Size
93KB
-
MD5
87aa0bedf293e9b16a93e4411353f367
-
SHA1
798ee41f78136c085eee631359f8ac314236f02e
-
SHA256
2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8
-
SHA512
f421a11526c04498ee9eb7a4d16c9d400703cb7a146dcf4e8badcd94d063cc68e37d9a26fbfec970d1bfe813c7d4cf5f1d8d8ceb729e35e2a3ebff26409bcc75
-
SSDEEP
1536:0qOzjP7rX/AI4A0gMAsgMA0IUxz/SVU7wuZuYQ2iMjYhmhVYct2DsWjcdbkUOX5y:JSAvDDvtbkUOX5D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8
Files
-
2ab1807811e0fa7484f6017f2b9ff7f8277ba5a4ddf59d371acef8a1d7e758b8.dll regsvr32 windows:5 windows x86 arch:x86
9866de1b3f49d2664bf8e33e2090307e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetLastError
GetProcAddress
LoadLibraryA
CloseHandle
ReadFile
GetModuleFileNameW
CreateFileW
VirtualAlloc
lstrcatW
OutputDebugStringA
GetThreadContext
SetThreadContext
CreateProcessW
ReadProcessMemory
VirtualAllocEx
GetModuleHandleA
WriteProcessMemory
ResumeThread
WriteConsoleW
SetStdHandle
OutputDebugStringW
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
HeapSize
HeapFree
RaiseException
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
WriteFile
LoadLibraryExW
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
LCMapStringW
HeapReAlloc
RtlUnwind
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
Exports
Exports
CreateThisKey
DeleteString
DllRegisterServer
DllUnregisterServer
FindResources
FindStaticResources
FreeDirectDrawInstance
FreeResources
GetCUICustomizationKey
GetCommonRegKey
GetDirectDrawInstance
GetMyRegKey
InitializeKeyHook
LoadACCELERATORS
LoadBITMAP
LoadBitmapFromFile
LoadCURSOR
LoadDialogString
LoadICON
LoadIMAGE
LoadSTRING
LoadSTRINGFromHKCU
SaveString
StretchBitmap
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ