C:\Users\john\Desktop\af\DLL_test_hj3 -不过UAC 不写注册表\Debug\DLL_test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd.dll
Resource
win10v2004-20231215-en
General
-
Target
f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd
-
Size
161KB
-
MD5
ab035c297e5f28995cbdff416caacaa7
-
SHA1
53525da91e87326cea124955cbc075f8e8f3276b
-
SHA256
f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd
-
SHA512
b11af10a29aaf5c5a501d26902b11b4cf86ebec30fb6d6b0a9cc0aa9c4f640de8edc77f5bbb667dd5ef52ed7bd52aec5ded3b2969b80b4fd18b98b2ef38aadf8
-
SSDEEP
3072:1TLBNGQ4+Dv7KcfOcO3V7gaKywdRJUnBAOqhM:bkQ4+T9O3VxKLSAOqi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd
Files
-
f61aa113b376c3434904fe2780a46878c3a6a15117e57373f4ec5cd4e9a419dd.dll windows:5 windows x86 arch:x86
40a528c6fb0cf82e5d8cc7bb7a5b22a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTempPathA
GetVersionExW
Sleep
lstrlenW
GetModuleFileNameW
GetShortPathNameW
GetSystemDirectoryW
GetShortPathNameA
lstrcatW
GetEnvironmentVariableA
CreateProcessW
lstrcpyW
GetTempPathW
CreateFileA
DeleteFileW
CreateFileW
DisableThreadLibraryCalls
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryA
GetModuleHandleA
ReadFile
GetFileSize
EnumSystemLocalesA
GetLocaleInfoA
SetFilePointer
WriteFile
CloseHandle
GetProcAddress
DeleteFileA
ExitProcess
GetLastError
HeapFree
GetModuleHandleW
DecodePointer
HeapAlloc
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
LoadLibraryW
IsProcessorFeaturePresent
EncodePointer
HeapCreate
HeapDestroy
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
VirtualQuery
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapReAlloc
LCMapStringW
GetStringTypeW
GetUserDefaultLCID
IsValidLocale
user32
wsprintfW
advapi32
RegOpenKeyExA
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegSetValueExA
Exports
Exports
EnCrashRepClearInfo
EnCrashRepCreateDumpFile
EnCrashRepCreateStackFile
EnCrashRepExceptionFilter
EnCrashRepSetInfo
EnCrashRepSetOptions
EnCrashRepSubmitReport
MyStart
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ