s:\IDM_projects\Mozilla\idmcchandler\64bit\Release\idmcchandler64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
12094a47a9659b1c2f7c5b36e21d2b0145c9e7b2e79845a437508efa96e5f305.dll
Resource
win7-20240215-en
General
-
Target
f673f0789fcfa61d30414464b763356e2d65ef07a596ebed4a615cd512557721
-
Size
437KB
-
MD5
3544b572e91ebb15aa097b1d2622955d
-
SHA1
0f851499be148ff7f945c583b0f7dc022c6fef46
-
SHA256
f673f0789fcfa61d30414464b763356e2d65ef07a596ebed4a615cd512557721
-
SHA512
6220bdfaf385898b85018f86b5306ae2ebaad6d106d737fecfc82a73158366883c479ad6290ec7110e792796599d77b1854d93f2a1861d50cbf07afbff9eef9e
-
SSDEEP
12288:7+GWGJAvSA64fHbgPWLBqSkuBmr0xxWszL:KGW4Avj7MWlklqr3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/12094a47a9659b1c2f7c5b36e21d2b0145c9e7b2e79845a437508efa96e5f305.exe
Files
-
f673f0789fcfa61d30414464b763356e2d65ef07a596ebed4a615cd512557721.zip
Password: infected
-
12094a47a9659b1c2f7c5b36e21d2b0145c9e7b2e79845a437508efa96e5f305.exe.dll windows:5 windows x64 arch:x64
7ac0eda9d6d9ff6c6cff5e90f8c35ca2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
wininet
InternetCombineUrlA
version
GetFileVersionInfoSizeW
VerQueryValueA
GetFileVersionInfoW
kernel32
GetLocaleInfoA
GetStringTypeW
GetCurrentProcessId
GetLastError
CreateThread
LoadLibraryA
GetSystemDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetWindowsDirectoryA
GetFileAttributesA
GetCurrentProcess
GetFileSize
CreateFileA
CreateMutexA
OutputDebugStringW
OutputDebugStringA
SetEnvironmentVariableA
ReadFile
GetCurrentThreadId
ResetEvent
CreateEventA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WaitForSingleObject
FindNextFileW
WriteConsoleA
FlushFileBuffers
SetStdHandle
HeapReAlloc
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
ReleaseMutex
GetVersionExA
CreateFileW
FindFirstFileW
FindClose
MulDiv
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
LoadLibraryW
GetProcAddress
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcessHeap
GetFileAttributesW
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
HeapSize
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FlsAlloc
SetLastError
HeapFree
HeapAlloc
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
FlsSetValue
GetCommandLineA
HeapSetInformation
HeapCreate
HeapDestroy
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsFree
user32
GetDC
IntersectRect
ReleaseDC
ShowWindow
PostMessageA
GetCursorPos
GetClassNameA
GetParent
IsWindow
GetKeyboardState
GetKeyState
MessageBoxW
MessageBoxA
LoadIconA
LoadCursorA
RegisterClassA
DefWindowProcA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
ScreenToClient
PtInRect
SendMessageA
GetClientRect
GetSystemMetrics
gdi32
TranslateCharsetInfo
GetDeviceCaps
GetStockObject
advapi32
OpenProcessToken
RegOpenKeyExW
RegNotifyChangeKeyValue
RegSetValueExA
RegCreateKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegRestoreKeyA
RegLoadKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyA
RegCloseKey
RegQueryValueExA
RegQueryValueExW
shell32
ShellExecuteA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
VariantInit
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
Exports
Exports
IDMMzCC_DownloadAllWithIDM
IDMMzCC_DownloadLast10FLVwithIDM
IDMMzCC_DownloadLastFLVwithIDM
EditOwnerInfo
IDMMzCC_GetListenerState
IDMMzCC_InitCC
IDMMzCC_Observe
IDMMzCC_OnGetSelectedTabID
IDMMzCC_OnME
IDMMzCC_OnTabSelect
IDMMzCC_OnUnload
hostFile
IDMMzCC_ShouldLoad2
IDMMzCC_ShouldLoad_old1
Sections
.text Size: 531KB - Virtual size: 531KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ