c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u381\237\build\windows-i586\deploy\tmp\javacpl\obj\javacpl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb.dll
Resource
win10v2004-20240226-en
General
-
Target
13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb
-
Size
452KB
-
MD5
17147e6f48e7e8a4b7c1e6c8d2112c8c
-
SHA1
f2717cc1e514883152a065adb8ccf50fbfdc63b8
-
SHA256
13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb
-
SHA512
c2bdf482c0a0819689288c1a28b277a0d9ed7ae11e2dec8a1484f4c6d17b20d9160fe3d37a91a77cdc195bd12b464c1df404a5253f840beba3790996660cab3b
-
SSDEEP
12288:xm8866BpX4umCL2POUvFl6VHu8q1jBGWnP/GKjReBXzVOLnG:xmRB544L2riHcjBGeP/GKGxcnG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb
Files
-
13873fb5336e96be55ab88d5bfaf7ed8689ce8fc00193f2c30f1013a41be12cb.dll windows:6 windows x86 arch:x86
271a30082211eb5375085d78c47e72dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
OpenInputDesktop
CloseDesktop
GetShellWindow
MessageBoxA
LoadStringA
GetWindowThreadProcessId
wsprintfA
kernel32
RtlUnwind
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
LoadLibraryExA
VirtualQuery
VirtualProtect
VerSetConditionMask
GetEnvironmentVariableA
CreateFileA
GetLongPathNameA
GetTempPathA
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
GetCurrentProcess
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetNativeSystemInfo
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
GetShortPathNameA
FormatMessageA
lstrlenA
VerifyVersionInfoA
WTSGetActiveConsoleSessionId
SetEvent
OpenEventA
lstrcatA
OutputDebugStringA
GetCurrentProcessId
GetCurrentThreadId
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
GetSystemInfo
WriteConsoleW
ReadConsoleW
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
ReadFile
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetEnvironmentStringsW
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
SetEnvironmentVariableW
GetStdHandle
GetCurrentDirectoryW
GetFullPathNameW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
SetStdHandle
HeapSize
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
SetEndOfFile
ole32
CoTaskMemFree
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
SysStringLen
SysAllocStringByteLen
VariantClear
Exports
Exports
CPlApplet
DllMain
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 251KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ