C:\Users\cmz\Desktop\ImDX11Hook-main\x64\Release\ImDX11Hook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
$R5JXAF7.dll
Resource
win7-20240215-de
Behavioral task
behavioral2
Sample
$R5JXAF7.dll
Resource
win10v2004-20240319-de
General
-
Target
$R5JXAF7.dll
-
Size
877KB
-
MD5
39a251b63703bc934ce22db2993545e2
-
SHA1
5b796a1323626bb21d4f61ffb81575a01a618bdd
-
SHA256
4890e5effdd7208b8408e3ec5bbe35a6c448f990b3c68a0930b478d43378b64d
-
SHA512
4ed00a838985792afecc6a224e263d0cc6d59885a023f198cfa01b8c0af38869739100e05ec77c09e9b1f70f82fc7850ae625d7ff9dc1ee6e9d571e9c0c61372
-
SSDEEP
12288:vZJ8fkV7oYH64Qy5Lon3ltLBK1hCOXQ7RsgjfGfQOIWD/LQMBUN:IW0YH6uZonnBK1tyFDG4OIKkM2N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource $R5JXAF7.dll
Files
-
$R5JXAF7.dll.dll windows:6 windows x64 arch:x64
2c463fc9b1dcfedfb7776129eff38cb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualFree
VirtualAlloc
GetModuleHandleA
GetSystemInfo
VirtualQuery
HeapCreate
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
HeapAlloc
HeapDestroy
GetThreadContext
GetProcAddress
GetCurrentProcessId
FlushInstructionCache
SetThreadContext
AllocConsole
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
QueryPerformanceFrequency
QueryPerformanceCounter
SetConsoleTextAttribute
GetStdHandle
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetSystemTimeAsFileTime
InitializeSListHead
GetConsoleWindow
CreateThread
VirtualProtect
CloseHandle
DisableThreadLibraryCalls
OpenThread
ReleaseSRWLockExclusive
FreeLibraryAndExitThread
user32
CallWindowProcA
DefWindowProcA
CreateWindowExA
UnregisterClassA
SetWindowLongPtrA
RegisterClassExA
ShowCursor
DestroyWindow
GetKeyState
ScreenToClient
ClientToScreen
IsChild
GetForegroundWindow
GetAsyncKeyState
DeleteMenu
GetSystemMenu
SetClipboardData
LoadCursorA
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetCursorPos
SetCursorPos
GetClientRect
SetCursor
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
imm32
ImmGetContext
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionWindow
d3dcompiler_47
D3DCompile
xinput1_4
ord2
ord4
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_type_info_destroy_list
memmove
memcpy
memcmp
memchr
memset
_CxxThrowException
__C_specific_handler
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
fclose
fseek
freopen_s
fwrite
_wfopen
__acrt_iob_func
__stdio_common_vsprintf
ftell
__stdio_common_vsscanf
fflush
fread
api-ms-win-crt-runtime-l1-1-0
abort
_initterm_e
_initterm
_cexit
_crt_atexit
_seh_filter_dll
system
_invalid_parameter_noinfo_noreturn
_execute_onexit_table
_register_onexit_function
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
calloc
free
api-ms-win-crt-convert-l1-1-0
atof
strtoull
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
strcmp
strncpy
strncmp
api-ms-win-crt-math-l1-1-0
acosf
sinf
fmodf
sqrtf
cosf
ceilf
Sections
.text Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 483KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ