escript.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8ad3d589bd4ec6679b81c3b8eea875ddd2cbfc1a9bc611dd335c63467ce5d452.dll
Resource
win7-20231129-en
General
-
Target
8ad3d589bd4ec6679b81c3b8eea875ddd2cbfc1a9bc611dd335c63467ce5d452
-
Size
3.2MB
-
MD5
5b13f2b5cb032212e2e2b303ce5c28a4
-
SHA1
703183c2fb4c22ac0457c0f3dc2a81f3dd47ef97
-
SHA256
8ad3d589bd4ec6679b81c3b8eea875ddd2cbfc1a9bc611dd335c63467ce5d452
-
SHA512
a8e3196a9c2a989343728b48645cbd184be5fcbe48472bca7f33572e3f2cce35b8c3886cfdd27691553b4a8ba09876b7fb049827fef745d8d00cb55845def5d0
-
SSDEEP
49152:ulDfTOaPLAhAACAAWebx3DyNMFA2SeFbP+XdPz8ZghoPg+3SNraMGMBWcO:uhyaPL+JCAjNMFA2SwwUPg+3yTX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ad3d589bd4ec6679b81c3b8eea875ddd2cbfc1a9bc611dd335c63467ce5d452
Files
-
8ad3d589bd4ec6679b81c3b8eea875ddd2cbfc1a9bc611dd335c63467ce5d452.dll windows:6 windows x86 arch:x86
dd2e849058f6f79a969241936286b742
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcatA
lstrlenA
MultiByteToWideChar
GetModuleFileNameA
FreeResource
LoadResource
LockResource
SizeofResource
FindResourceA
GetACP
lstrcpyA
FreeLibrary
DisableThreadLibraryCalls
GetTickCount
FindAtomW
DeleteCriticalSection
OutputDebugStringW
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
IsDebuggerPresent
EncodePointer
VirtualQuery
GetSystemInfo
VirtualFree
VirtualAlloc
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
TlsAlloc
TlsSetValue
LoadLibraryExA
InitializeCriticalSectionEx
RaiseException
DecodePointer
LoadLibraryW
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
SetLastError
GetLastError
OutputDebugStringA
GetProcessHeap
HeapFree
HeapAlloc
SetFileAttributesW
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessW
GetProcAddress
GetModuleHandleW
TerminateProcess
GetCurrentProcess
user32
GetMessageA
GetKeyState
FindWindowA
GetPropW
SetPropW
GetFocus
SetFocus
MoveWindow
TranslateMessage
GetAsyncKeyState
GetWindowRect
GetDC
wsprintfA
MessageBeep
GetSystemMetrics
MsgWaitForMultipleObjects
PeekMessageA
DispatchMessageA
gdi32
EnumFontFamiliesA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
ole32
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
msvcp120
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
_Nan
?_Syserror_map@std@@YAPBDH@Z
?_Winerror_map@std@@YAPBDH@Z
??0_Container_base12@std@@QAE@XZ
??1_Container_base12@std@@QAE@XZ
?_Orphan_all@_Container_base12@std@@QAEXXZ
?_Xbad_alloc@std@@YAXXZ
msvcr120
fflush
sprintf
fwrite
printf
_tzset
_mktime64
_errno
strftime
isprint
_setjmp3
abort
??1type_info@@UAE@XZ
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
_except1
_vsnprintf_s
_crt_debugger_hook
_HUGE
localeconv
ceil
tan
log
__crtUnhandledException
__crtTerminateProcess
_except_handler4_common
?terminate@@YAXXZ
__CppXcptFilter
_amsg_exit
_malloc_crt
_initterm
_initterm_e
__clean_type_info_names_internal
_fileno
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
memcpy
strlen
_CxxThrowException
__CxxFrameHandler3
strcmp
??_V@YAXPAX@Z
_set_invalid_parameter_handler
memchr
memcmp
memset
vsprintf_s
atoi
_isnan
_exit
_itoa_s
_swab
_purecall
_splitpath_s
strcpy
_mbschr
_mbscspn
_mbsicmp
_mbsrchr
_ismbblead
_ismbbtrail
atof
wcscmp
_wcslwr_s
isspace
isalnum
strtok_s
sscanf
wcscpy
wcslen
wcsncpy
_fcvt
fmod
pow
isalpha
isdigit
toupper
tolower
calloc
free
_recalloc
getenv
strrchr
_ltoa_s
_wtoi
fopen
fputs
_vsnprintf
strchr
fclose
fputc
_mbsstr
fabs
sqrt
atol
atan2
cos
sin
_gmtime64
_localtime64
_time64
_strlwr
isupper
isxdigit
_stricmp
strncmp
_strnicmp
strstr
acos
strpbrk
__iob_func
getc
malloc
realloc
floor
_fstat64i32
fprintf
log10
rand_s
_copysign
asin
atan
exp
psapi
GetProcessMemoryInfo
winmm
timeEndPeriod
timeBeginPeriod
Exports
Exports
?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z
?CreateExponentialRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHPAVStringBuilder@2@@Z
?DoubleToAscii@DoubleToStringConverter@double_conversion@@SAXNW4DtoaMode@12@HPADHPA_NPAH3@Z
?EcmaScriptConverter@DoubleToStringConverter@double_conversion@@SAABV12@XZ
?HandleSpecialValues@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@@Z
?HashBytes@mozilla@@YAIPBXI@Z
?ToExponential@DoubleToStringConverter@double_conversion@@QBE_NNHPAVStringBuilder@2@@Z
?ToFixed@DoubleToStringConverter@double_conversion@@QBE_NNHPAVStringBuilder@2@@Z
?ToPrecision@DoubleToStringConverter@double_conversion@@QBE_NNHPAVStringBuilder@2@@Z
?ToShortestIeeeNumber@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@W4DtoaMode@12@@Z
?kBase10MaximalLength@DoubleToStringConverter@double_conversion@@2HB
PlugInMain
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 517KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 845KB - Virtual size: 848KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ