adoberfp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d.dll
Resource
win10v2004-20240226-en
General
-
Target
6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d
-
Size
528KB
-
MD5
020faa133724e023555f8cb094386727
-
SHA1
87aa38f42acf8d7ff1b79b22a03ef5ea92fc3e4b
-
SHA256
6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d
-
SHA512
3016a268eb1ff43bfb8e78a814a20a3ef1b7ce0a8d20d673bf6cf2e2fc0b097dfacb6029f754035a5a12c648e290860ba05134c535977cbe7e99643cfed45ab8
-
SSDEEP
12288:0WCAzq1fATq+ZgxcbtWPk341g3yR6wokC4HzIi:0WrzY+HIPEIgidC4T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d
Files
-
6a6ef7013c80696e6a2fae5a89303eba8acd3e4e6f9d446632144f8b1cebdf3d.dll regsvr32 windows:6 windows x86 arch:x86
1644c51447a86adfc5e532442b88312b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
OpenProcess
CopyFileW
WideCharToMultiByte
InitializeCriticalSection
FindResourceExW
LockResource
GlobalReAlloc
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetTempPathW
SetFileAttributesW
DeleteFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
WriteFile
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CloseHandle
FindFirstFileExW
FindClose
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
GetStdHandle
LCMapStringW
CompareStringW
GetModuleHandleExW
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetFileAttributesExW
VirtualQuery
VirtualProtect
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlUnwind
LocalFree
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReadFile
GetFileSize
CreateFileW
SetThreadLocale
GetThreadLocale
EncodePointer
lstrcmpiW
FindResourceW
SizeofResource
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
FreeLibrary
MultiByteToWideChar
lstrcmpW
MulDiv
GlobalLock
GlobalUnlock
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
TerminateProcess
GlobalAlloc
GetCurrentThreadId
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
FindNextFileW
DecodePointer
user32
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
MoveWindow
DefWindowProcW
PostMessageW
RegisterWindowMessageW
CharLowerBuffW
UnregisterClassW
SendMessageW
SetWindowPos
CallWindowProcW
GetDlgItem
CharNextW
SetFocus
GetFocus
SetCapture
ReleaseCapture
SetTimer
GetWindowThreadProcessId
PeekMessageW
SetParent
ShowWindow
FindWindowW
IsClipboardFormatAvailable
EmptyClipboard
GetClipboardData
CloseClipboard
OpenClipboard
LoadCursorW
GetWindow
GetClassNameW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
OffsetRect
FillRect
GetSysColor
ScreenToClient
ClientToScreen
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
KillTimer
advapi32
CryptDestroyHash
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetKeyParam
CryptGetHashParam
CryptImportKey
CryptDecrypt
CryptCreateHash
CryptHashData
RegCloseKey
ole32
CreateStreamOnHGlobal
CoGetClassObject
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
HWND_UserFree
HWND_UserUnmarshal
HWND_UserMarshal
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CreateBindCtx
OleInitialize
OleUninitialize
OleDraw
OleLockRunning
HWND_UserSize
CoTaskMemRealloc
shell32
SHGetDesktopFolder
oleaut32
SysAllocString
VarBstrCmp
SysAllocStringLen
VariantInit
VariantClear
OleCreateFontIndirect
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserFree
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
SafeArrayCreate
SafeArrayGetUBound
LoadRegTypeLi
SafeArrayLock
VariantCopy
RegisterTypeLi
UnRegisterTypeLi
OleLoadPicture
SafeArrayDestroy
SafeArrayUnlock
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCopy
SafeArrayGetVartype
VariantChangeType
VarI4FromStr
VarBstrFromI4
SysStringLen
SysFreeString
SafeArrayGetLBound
LoadTypeLi
gdi32
SetEnhMetaFileBits
GetDIBits
PlayEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
DeleteEnhMetaFile
CreateDIBSection
CopyEnhMetaFileW
SetBrushOrgEx
GetObjectW
SetStretchBltMode
CreateCompatibleBitmap
StretchBlt
SelectObject
GetStockObject
BitBlt
DeleteObject
GetDeviceCaps
CreateCompatibleDC
CreateSolidBrush
DeleteDC
urlmon
CreateURLMonikerEx
CoInternetSetFeatureEnabled
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrCStdStubBuffer_Release
NdrClientCall2
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrOleAllocate
NdrOleFree
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 245B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ