C:\Users\test\Desktop\GOTOBJ\mm\mm\DDD-20210606\SKEYE\Release\HOLLOWING.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5.dll
Resource
win10v2004-20240226-en
General
-
Target
7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5
-
Size
93KB
-
MD5
6bdf1c294b6a34a5769e872d49afd9e7
-
SHA1
048d50ceb6c5112ba95ea58be258b7aaee3f7416
-
SHA256
7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5
-
SHA512
0c17d01d25cc74cd32a1b814b237b443a5afcfd07808a61cf0481bd059f17661a2b8859646831bc9386251856db7f428c2efb41722922b36daedc21304787d28
-
SSDEEP
1536:dgQg4P4mraxfRjYguEn0QS93c/lsWjcdiS0rVUi9:JPdmfKSwjiS0rV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5
Files
-
7dd168b3a77abac8a8e8503cf4dae72844be2c1d7e6070858283a798e91246c5.dll windows:5 windows x86 arch:x86
d43c5b183e2c627d295a15fd5732a685
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetLastError
GetProcAddress
LoadLibraryA
CloseHandle
GetModuleFileNameW
VirtualAlloc
CreateProcessW
VirtualAllocEx
FlushFileBuffers
WriteConsoleW
SetStdHandle
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
HeapSize
HeapFree
RaiseException
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
WriteFile
LoadLibraryExW
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
LCMapStringW
HeapReAlloc
RtlUnwind
GetConsoleCP
GetConsoleMode
SetFilePointerEx
OutputDebugStringW
CreateFileW
Exports
Exports
GetCommonShellVersion3
GetEngine3
RPC_EngineAddRef
RPC_EngineAllowUpdating
RPC_EngineExcludeThisThread
RPC_EngineFlushBackupDirectory
RPC_EngineGetInfoDatExtensionInfo
RPC_EngineGetInfoDats
RPC_EngineGetInfoVersion
RPC_EngineGetInfoVirusNames
RPC_EngineGetPointProductData
RPC_EngineGetScanner
RPC_EngineGetSecurityPrivileges
RPC_EngineGetVersionAndLocation
RPC_EngineRelease
RPC_EngineSetBackupDirectory
RPC_EngineSetQuarantineDir
RPC_EngineUnExcludeThisThread
RPC_EngineWaitForEngineUpdate
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ