C:\Users\Prx.Build\AppData\Local\Programs\DTN\ProphetX64\PrxFeeder.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece.dll
Resource
win10v2004-20240508-en
General
-
Target
ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece
-
Size
166KB
-
MD5
6637bf65b5e80d21b21af06eae4245eb
-
SHA1
c400116fbc9cfc59fde62862f0bdb4763a56c65d
-
SHA256
ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece
-
SHA512
7a528aba1d2e93254e233e6d28ab3362a031b21e09d6529329e9020881c6f46155cf699c95b92d9a60646f0863ae08b85ee40f98e32ff9f321366f3b1ff5a68a
-
SSDEEP
3072:XagJamNtbgYB7NzjtYdq20DLHGAhGhYjvl+hZNIJHcIrCA:XptUYfSYZDLHtrl+hZNIJLr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece
Files
-
ef140fbd3c7a9c9f7f17e754f7dfdfb4b69cb64433fbf188fe1e2de5c3f99ece.dll regsvr32 windows:6 windows x64 arch:x64
cb4ad6f1798681434ab34ae1fa768e04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
LockResource
SizeofResource
FindResourceW
lstrcmpiA
FindResourceA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
DeleteFileA
GetFileAttributesA
RaiseException
SetLastError
GetCurrentThreadId
MoveFileA
EncodePointer
DecodePointer
GetModuleHandleW
GetThreadLocale
SetThreadLocale
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
CloseHandle
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LocalFree
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetModuleFileNameA
QueryPerformanceCounter
FindResourceExW
GetLastError
user32
KillTimer
SendMessageA
ShowWindow
SetWindowPos
GetDlgItem
GetActiveWindow
CharNextA
CharNextW
LoadCursorA
GetWindowLongPtrA
SetTimer
EndDialog
DialogBoxParamA
DestroyWindow
UnregisterClassA
DefWindowProcA
CallWindowProcA
RegisterClassExA
GetClassInfoExA
CreateWindowExA
IsWindow
CreateDialogParamA
MonitorFromWindow
GetWindow
GetParent
SetWindowLongPtrA
GetWindowLongA
MapWindowPoints
MessageBoxA
GetWindowRect
GetClientRect
GetWindowTextLengthA
GetMonitorInfoA
GetWindowTextA
SetWindowTextA
EnableWindow
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegQueryInfoKeyA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
OleRun
StringFromGUID2
oleaut32
VarBstrFromDate
VarUdateFromDate
SysAllocString
UnRegisterTypeLi
GetErrorInfo
RegisterTypeLi
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
shlwapi
PathIsDirectoryA
vcruntime140
memmove
_CxxThrowException
__current_exception
memset
__std_type_info_destroy_list
__std_exception_destroy
memcpy
__C_specific_handler
__current_exception_context
__std_exception_copy
_purecall
memcmp
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_execute_onexit_table
_crt_atexit
_cexit
_initialize_onexit_table
_initterm
_initterm_e
_errno
_initialize_narrow_environment
_configure_narrow_argv
_register_onexit_function
_seh_filter_dll
terminate
_invalid_parameter_noinfo
_resetstkoflw
api-ms-win-crt-heap-l1-1-0
_recalloc
malloc
_callnewh
free
api-ms-win-crt-string-l1-1-0
strlen
strnlen
strcat_s
strcpy_s
wcsncpy_s
wcslen
strcpy
api-ms-win-crt-multibyte-l1-1-0
_mbscmp
_mbschr
_mbsrchr
_mbsnbcpy
_mbsicmp
_mbsstr
_mbsnbcpy_s
_mbsinc
_ismbcspace
api-ms-win-crt-convert-l1-1-0
atol
atof
api-ms-win-crt-stdio-l1-1-0
fclose
fwrite
__stdio_common_vsprintf_s
__stdio_common_vsprintf
fflush
fopen
fread
api-ms-win-crt-time-l1-1-0
strftime
_time64
_localtime64_s
api-ms-win-crt-filesystem-l1-1-0
_mkdir
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ