X:\Gitlab\Builds\e945be61\0\lab\protectionplatform\Output\Release\x64\eppcom64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
upfilles.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
upfilles.dll
Resource
win10v2004-20240426-en
General
-
Target
upfilles.dll
-
Size
508KB
-
MD5
ccb6d3cb020f56758622911ddd2f1fcb
-
SHA1
4a013f752c2bf84ca37e418175e0d9b6f61f636d
-
SHA256
f4cb6b684ea097f867d406a978b3422bbf2ecfea39236bf3ab99340996b825de
-
SHA512
6ed929967005eaa6407e273b53a1fedcb2b084d775bed17272fd05b1ce143dbf921ac201246dfbfdbe663c7351e44c12f162e6f03343548b69b5d4598bb3492e
-
SSDEEP
12288:8XG3MpAOIQ1LjbJFqzqUtYP4VnRk62yoK2:SpAOfFJIq/Py8K2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource upfilles.dll
Files
-
upfilles.dll.dll windows:6 windows x64 arch:x64
e88c273005cda54d8a7b362970475512
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
UnmapViewOfFile
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
MapViewOfFile
EncodePointer
EnterCriticalSection
LeaveCriticalSection
GetThreadLocale
SetThreadLocale
CreateFileW
GetFileSizeEx
CreateFileMappingW
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
DecodePointer
CloseHandle
CreateEventW
OpenEventA
CreateEventA
WaitForSingleObjectEx
ResetEvent
SetEvent
WriteConsoleW
GetConsoleMode
GetConsoleCP
WriteFile
LocalAlloc
SetLastError
LocalFree
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
SetFilePointerEx
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
CharNextW
advapi32
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
SysStringLen
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
ntdll
NtRequestWaitReplyPort
NtConnectPort
NtClose
NtRequestPort
RtlCaptureContext
RtlLookupFunctionEntry
NtCreateSection
RtlVirtualUnwind
RtlNtStatusToDosError
RtlInitUnicodeString
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
stow
DllUnregisterServer
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
hVr Size: 267KB - Virtual size: 268KB
IMAGE_SCN_MEM_READ