X:\Gitlab\Builds\e945be61\0\lab\protectionplatform\Output\Release\x64\eppcom64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0c7181195e3739c5408f7db26660576d0656bf22dce4f2ab4d76925935f67e4.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0c7181195e3739c5408f7db26660576d0656bf22dce4f2ab4d76925935f67e4.dll
Resource
win10v2004-20240226-en
General
-
Target
3ef28aaf4994359294424230e93350de.bin
-
Size
398KB
-
MD5
b71b4a249507b0daed2df74700095614
-
SHA1
8c099086fbece58c0ad82ae52e16be9dd378e9a5
-
SHA256
aa360912eea5b8374b854ee786c1701d600b8991a8f4f85fa455c9078f8d1ab2
-
SHA512
df5b32aaffffdc4248ea97db9d432e239fb5e2cac4ad00f66c7bd0eb8629c5e3f25a530bf6486bfb8c83760fc6b2ed07159af5e86859a70d1fb844ec574550d8
-
SSDEEP
6144:S/QdntqSBBNtyAPsBwDCrhNvA5CShvBCuCZtNcsB/STkjYip60j4Hm5iGvmY2EW8:S/vSbzya2rEW9KTBipf4Hm5pvmjJfa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b0c7181195e3739c5408f7db26660576d0656bf22dce4f2ab4d76925935f67e4.exe
Files
-
3ef28aaf4994359294424230e93350de.bin.zip
Password: infected
-
b0c7181195e3739c5408f7db26660576d0656bf22dce4f2ab4d76925935f67e4.exe.dll windows:6 windows x64 arch:x64
Password: infected
e88c273005cda54d8a7b362970475512
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
UnmapViewOfFile
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
MapViewOfFile
EncodePointer
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
SetThreadLocale
CreateFileW
GetFileSizeEx
CreateFileMappingW
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
DecodePointer
CloseHandle
CreateEventW
OpenEventA
CreateEventA
WaitForSingleObjectEx
ResetEvent
SetEvent
WriteConsoleW
GetConsoleMode
GetConsoleCP
WriteFile
LocalAlloc
SetLastError
LocalFree
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
SetFilePointerEx
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
CharNextW
advapi32
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
SysStringLen
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
ntdll
NtRequestWaitReplyPort
NtConnectPort
NtClose
NtRequestPort
RtlCaptureContext
RtlLookupFunctionEntry
NtCreateSection
RtlVirtualUnwind
RtlNtStatusToDosError
RtlInitUnicodeString
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
LTSoLUI
DllUnregisterServer
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
TlCz7 Size: 374KB - Virtual size: 376KB
IMAGE_SCN_MEM_READ