C:\Users\john\Desktop\af\DLL_test - upan -单独 - 老黑的版本\Debug\DLL_test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002.dll
Resource
win10v2004-20240226-en
General
-
Target
35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002
-
Size
166KB
-
MD5
73e76f3e7553db8a853e95018142c966
-
SHA1
041d9b089a9c8408c99073c9953ab59bd3447878
-
SHA256
35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002
-
SHA512
81dd36e745e684dd2aa41e9a2b16e27e421891e61f0cc63388538ac878d133943d4e55616290aaa60a8b0dcc37666bcbf117c382445fbdae56ce6b9893561a11
-
SSDEEP
3072:BO0Wv+gs/O1CBd8ghscsCObiVpPWSUXodmqig4e:nWWgs9BdzHO0mqj4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002
Files
-
35f3673c823719b3f87a4480322a1df7ea8229aa32bf943d92ee1dd1ff558002.dll windows:5 windows x86 arch:x86
e448d9a78d043ef6f334758bb48f6622
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTempPathA
GetVersionExW
Sleep
lstrlenW
GetModuleFileNameW
GetShortPathNameW
GetSystemDirectoryW
lstrcatW
GetShortPathNameA
CreateProcessW
lstrcpyW
GetTempPathW
DeleteFileA
DisableThreadLibraryCalls
GetModuleFileNameA
CreateFileA
GetDriveTypeA
WinExec
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryA
GetModuleHandleA
CreateFileW
ReadFile
GetFileSize
IsValidLocale
EnumSystemLocalesA
SetFilePointer
WriteFile
CloseHandle
GetProcAddress
GetEnvironmentVariableA
ExitProcess
GetLastError
HeapFree
GetModuleHandleW
DecodePointer
HeapAlloc
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryW
IsProcessorFeaturePresent
EncodePointer
HeapCreate
HeapDestroy
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
VirtualQuery
HeapSize
RtlUnwind
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
HeapReAlloc
CreateDirectoryA
user32
wsprintfW
advapi32
RegOpenKeyExA
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegSetValueExA
Exports
Exports
EnCrashRepClearInfo
EnCrashRepCreateDumpFile
EnCrashRepCreateStackFile
EnCrashRepExceptionFilter
EnCrashRepSetInfo
EnCrashRepSetOptions
EnCrashRepSubmitReport
MyStart
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ