acrxEntryPoint
Static task
static1
Behavioral task
behavioral1
Sample
a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc.dll
Resource
win10v2004-20240412-en
General
-
Target
a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc
-
Size
65KB
-
MD5
d678e75c2ec84c1dd472ad12b145a03d
-
SHA1
f02f42712a86f884458370423c3f8bc2abe14ae3
-
SHA256
a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc
-
SHA512
c2203a30a2f36b22097a881cdd42f23bee21356e5de43716a6b1986931fe79d72e2976fbc61e160136b98bd2dc3e285db765f1fa34831ee54c734a34186233b5
-
SSDEEP
1536:td0hzB8WpWQ2APSLy79wxQ9+I2OtOfHI:v/WIQgLY9+pOtOfHI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc
Files
-
a6f6a395a4e5fc527e3e6b0a49cd64992d3dc070c13b921605d4d58d4c39f8cc.dll windows:5 windows x86 arch:x86
52029ad8cd3b2ea5f7fff61e8af53095
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcr90
malloc
_stricmp
strncpy
_time64
_strdup
_localtime64
_difftime64
_strnicmp
_findfirst64i32
_findclose
strrchr
_mkdir
_chdrive
_getdrive
fread
fwrite
strtok
_getcwd
strncat
_splitpath
_makepath
_access
calloc
localeconv
memcpy
atoi
_unlink
_strupr
_chdir
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_except_handler4_common
memset
??2@YAPAXI@Z
_CxxThrowException
sscanf
strstr
strcmp
feof
fgets
strcat
fopen
fprintf
fclose
__CxxFrameHandler3
setlocale
strchr
strcpy
strlen
sprintf
??3@YAXPAX@Z
zrx
zcedGetVar
zcedSetVar
zcedRetNil
zcedRestoreStatusBar
zcedGetZcadFrame
zcedRetStr
zcedRegFunc
zcedDefun
zcedUndef
zcedRetVoid
zcedGetFunCode
zcutPrintf
??1ZcadAppInfo@@UAE@XZ
?writeCommandNameToRegistry@ZcadAppInfo@@QAE?AW4ErrorStatus@ZcadApp@@PBD0@Z
?writeGroupNameToRegistry@ZcadAppInfo@@QAE?AW4ErrorStatus@ZcadApp@@PBD@Z
?writeToRegistry@ZcadAppInfo@@QAE?AW4ErrorStatus@ZcadApp@@_N0@Z
?setLoadReason@ZcadAppInfo@@QAEXW4LoadReasons@ZcadApp@@@Z
?setAppDesc@ZcadAppInfo@@QAEXPBD@Z
?setModuleName@ZcadAppInfo@@QAEXPBD@Z
?setAppName@ZcadAppInfo@@QAEXPBD@Z
??0ZcadAppInfo@@QAE@XZ
zcedGetAppName
zcedZrxUnload
zcedMenuCmd
zcedCommand
zcedIsMenuGroupLoaded
zcedAlert
zds_term_dialog
zcrxUnlockApplication
zcrxRegisterAppMDIAware
zcutRelRb
zcedGetArgs
?close@ZcDbObject@@QAE?AW4ErrorStatus@Zcad@@XZ
mfc90
ord1241
ord391
ord1137
ord1152
ord265
ord266
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleFileNameA
GetModuleHandleA
user32
GetActiveWindow
comdlg32
GetOpenFileNameA
CommDlgExtendedError
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ