adoberfp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e9a08b5dc8349ab445c4733184f2fa1ba4de843cebad5fcc92799e3ecdbcc6fc.dll
Resource
win7-20240221-en
General
-
Target
e9a08b5dc8349ab445c4733184f2fa1ba4de843cebad5fcc92799e3ecdbcc6fc
-
Size
526KB
-
MD5
ef3fb278abdc5c32c496a3ac644740d9
-
SHA1
f1d7c190135e34841454513237c01b80ffde553d
-
SHA256
e9a08b5dc8349ab445c4733184f2fa1ba4de843cebad5fcc92799e3ecdbcc6fc
-
SHA512
d4a6b1600fe1eb1172499216d1954d1898d987253b8b42f56131ef712a56ce84b9359d44a3e33cb1945ca7e76ff33decee3b80b14c63c02987e9a0b28bf5ab1b
-
SSDEEP
12288:lUNGbEGEH8b5LOS0Fdr07SnDre+aIRIho2:l/FlOS0PrFDre+aIRa/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9a08b5dc8349ab445c4733184f2fa1ba4de843cebad5fcc92799e3ecdbcc6fc
Files
-
e9a08b5dc8349ab445c4733184f2fa1ba4de843cebad5fcc92799e3ecdbcc6fc.dll regsvr32 windows:6 windows x86 arch:x86
b3b53d65368903675722a4d7863df851
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTempPathW
TerminateProcess
OpenProcess
CopyFileW
WideCharToMultiByte
InitializeCriticalSection
FindResourceExW
LockResource
GlobalReAlloc
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
SetFileAttributesW
DeleteFileW
LocalFree
lstrlenA
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
ReadConsoleW
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
ReadFile
GetFileSize
CreateFileW
SetThreadLocale
GetThreadLocale
EncodePointer
FindResourceW
lstrcmpiW
SizeofResource
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
FreeLibrary
MultiByteToWideChar
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GetCommandLineA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
GetFileAttributesExW
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
GlobalAlloc
FlushInstructionCache
GetCurrentThreadId
GetCurrentProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
DecodePointer
user32
FillRect
SendMessageW
UnregisterClassW
CharLowerBuffW
RegisterWindowMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
IsChild
DestroyWindow
MoveWindow
SetWindowPos
GetDlgItem
CharNextW
SetFocus
GetFocus
SetCapture
GetWindowThreadProcessId
PeekMessageW
SetParent
ShowWindow
FindWindowW
IsClipboardFormatAvailable
ReleaseCapture
GetClipboardData
CloseClipboard
OpenClipboard
LoadCursorW
GetWindow
GetClassNameW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
OffsetRect
EmptyClipboard
GetSysColor
ScreenToClient
ClientToScreen
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
KillTimer
SetTimer
advapi32
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetKeyParam
CryptGetHashParam
CryptImportKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
ole32
CreateStreamOnHGlobal
CoGetClassObject
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CreateBindCtx
OleInitialize
OleUninitialize
CoTaskMemRealloc
HWND_UserFree
HWND_UserUnmarshal
HWND_UserMarshal
HWND_UserSize
OleLockRunning
OleDraw
shell32
SHGetDesktopFolder
oleaut32
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserFree
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayLock
VariantCopy
RegisterTypeLi
UnRegisterTypeLi
OleLoadPicture
SafeArrayDestroy
SafeArrayUnlock
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCopy
SafeArrayGetVartype
VariantChangeType
VarI4FromStr
VarBstrFromI4
VariantClear
VariantInit
SysAllocStringLen
VarBstrCmp
SysAllocString
LoadRegTypeLi
LoadTypeLi
SysStringLen
SysFreeString
OleCreateFontIndirect
gdi32
SetEnhMetaFileBits
GetDIBits
PlayEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
DeleteEnhMetaFile
CreateDIBSection
CopyEnhMetaFileW
StretchBlt
SelectObject
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SetBrushOrgEx
BitBlt
SetStretchBltMode
GetObjectW
urlmon
CreateURLMonikerEx
CoInternetSetFeatureEnabled
rpcrt4
IUnknown_AddRef_Proxy
NdrOleAllocate
UuidToStringW
UuidCreate
RpcStringFreeW
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrCStdStubBuffer_Release
NdrClientCall2
IUnknown_QueryInterface_Proxy
NdrOleFree
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
CStdStubBuffer_Disconnect
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_CountRefs
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_DebugServerRelease
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 247B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 270KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ