d:\dbs\el\sa1\target\x86\ship\misc_name\x-none\NAME.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290.dll
Resource
win10v2004-20240226-en
General
-
Target
f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290
-
Size
301KB
-
MD5
169a72e9f3f012f1884859482ed95e83
-
SHA1
c266c9d36462552d9c50cf829da94db0b6b21546
-
SHA256
f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290
-
SHA512
74858652427b92b2cc8ba1f22dd128453368effdac6766c0a9839d5c5eb8432c1862b153115761771653a36dc5bb4b15b7d9c51d438dcdbd771e83a2c9f79197
-
SSDEEP
6144:DD6B+lN0QOWm3Uwasf3GCbqsSK+vWb5zX/PpXLUaGJMQV1k497SjRk:8S+oQeDHvAzX/xbVGJpXk2Gj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290
Files
-
f3ccdc08a4c4bb38537b04c2d3916dc510d5ce1439500e645d24584b67c8b290.dll regsvr32 windows:6 windows x86 arch:x86
af16af1eab3557c6f6cbb6442d2021cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateEventA
lstrlenW
GetSystemDirectoryW
LoadLibraryExW
ProcessIdToSessionId
CreateThread
HeapFree
OutputDebugStringA
GetModuleFileNameW
LoadLibraryW
HeapAlloc
GetProcessHeap
IsDebuggerPresent
InitializeCriticalSection
WaitForSingleObject
SetLastError
GetCurrentThreadId
MulDiv
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
EncodePointer
CloseHandle
DisableThreadLibraryCalls
GetModuleFileNameA
LoadLibraryExA
InitializeCriticalSectionEx
FindResourceA
LoadResource
SizeofResource
WideCharToMultiByte
IsDBCSLeadByte
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
GetProcAddress
FreeLibrary
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
SetEvent
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
VirtualQuery
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
GetSystemInfo
VirtualProtect
gdi32
RestoreDC
CreateDCA
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
GetDeviceCaps
SetTextAlign
TextOutA
DeleteDC
advapi32
RegCloseKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegQueryValueExW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegQueryValueExA
RegQueryInfoKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteKeyA
ole32
StringFromCLSID
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitializeEx
CoCreateInstanceEx
StringFromGUID2
CoCreateInstance
oleaut32
SysStringLen
SysFreeString
LoadTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadRegTypeLi
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysAllocString
SysAllocStringLen
vcruntime140
__std_type_info_destroy_list
memcmp
_CxxThrowException
memcpy
strstr
_purecall
wcschr
__CxxFrameHandler3
__std_exception_destroy
__std_exception_copy
__std_terminate
memset
_except_handler4_common
api-ms-win-crt-heap-l1-1-0
_recalloc
free
malloc
api-ms-win-crt-string-l1-1-0
_strnicmp
_stricmp
strcat_s
wcsncpy_s
strcpy_s
strnlen
strncpy_s
_wcsicmp
api-ms-win-crt-runtime-l1-1-0
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
_resetstkoflw
_seh_filter_dll
_initterm_e
_initterm
_invalid_parameter_noinfo
_configure_narrow_argv
_errno
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
__stdio_common_vswprintf_s
api-ms-win-crt-locale-l1-1-0
__initialize_lconv_for_unsigned_char
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 230KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ