d:\dbs\el\da1\target\x86\ship\click2run\x-none\JitV.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf45928d7f08dedc925936d21649ca9338138b24c8fa9c3826821beabb4d457d.dll
Resource
win7-20240221-en
General
-
Target
cf45928d7f08dedc925936d21649ca9338138b24c8fa9c3826821beabb4d457d
-
Size
667KB
-
MD5
2dc21a8a18cdb9ee195b05f707161aa8
-
SHA1
ebf5706386a4191585711b99a16627dc4ecee55c
-
SHA256
cf45928d7f08dedc925936d21649ca9338138b24c8fa9c3826821beabb4d457d
-
SHA512
dfa7a39d79257a06c0cbc3c2165573ff17328e6e41072cb183f08169ad31903e0a8f1767cfd4386faa9e5fd50af09399f24823869d42c7d76b365b59c92ea179
-
SSDEEP
12288:JjOK9NAWDbtLXUwW4gZuir5XesUJKcy7CB7WKGuVC:JjH9ruwW4gIi1XIy7CB8u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf45928d7f08dedc925936d21649ca9338138b24c8fa9c3826821beabb4d457d
Files
-
cf45928d7f08dedc925936d21649ca9338138b24c8fa9c3826821beabb4d457d.dll windows:6 windows x86 arch:x86
5b88a3bc3186955dd56ef86d971c8a80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LCMapStringW
GetSystemTimeAsFileTime
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
GetCurrentProcessId
InitializeSRWLock
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
FileTimeToSystemTime
IsValidCodePage
SetLastError
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
GetCurrentThread
WriteConsoleW
CreateFileW
CloseHandle
FindClose
ResumeThread
GetCurrentThreadId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
SetErrorMode
GetModuleFileNameW
GetVersionExW
IsWow64Process
FreeLibrary
GetProcAddress
CompareStringEx
GetLastError
GetModuleHandleExW
MultiByteToWideChar
GetCurrentProcess
GetConsoleMode
GetConsoleOutputCP
VirtualProtect
VirtualFree
VirtualAlloc
SuspendThread
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
LoadLibraryExA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
InitOnceComplete
InitOnceBeginInitialize
WaitForSingleObjectEx
RaiseException
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapSize
ExitProcess
HeapFree
HeapAlloc
GetStdHandle
GetFileType
HeapReAlloc
GetProcessHeap
GetACP
GetOEMCP
SetFilePointerEx
FindFirstFileExW
FindNextFileW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
FlushFileBuffers
WriteFile
ole32
StringFromGUID2
advapi32
EventUnregister
EventRegister
EventWriteTransfer
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
Exports
Exports
APIExportForDetours
DisableVirtualizationOnThread
EnableVirtualizationOnThread
IsCurrentThreadVirtualized
Sections
.text Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 283KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ