efsext.pdb
Static task
static1
Behavioral task
behavioral1
Sample
efsext.dll
Resource
win10v2004-20240426-en
General
-
Target
efsext.dll
-
Size
54KB
-
MD5
12d57310ce78a9221ab6f3ef4b1fd9ad
-
SHA1
1d5bcca0315774d39f62b03e682942f5de9d00a6
-
SHA256
794527871454cbcfedc494e2303ebdd1ba2c5406e2be1b0361678a6cd4d34eb5
-
SHA512
c5f0621c709604c1a35b7f907b522acced7c40769274669414edaf29586fa9816b09c4dff31901199d60f08821cec245835a39853a77f9bde19d21374e676520
-
SSDEEP
1536:y9uPqRFTNfz+Lp7OhoRl3uSKnFlHjv67:TqDTlepooRUC7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efsext.dll
Files
-
efsext.dll.dll windows:10 windows x86 arch:x86
915dba9792dc595698b493e7f8d6909d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
memcpy
_except_handler4_common
??1type_info@@UAE@XZ
_onexit
__dllonexit
__CxxFrameHandler3
_lock
_initterm
malloc
_amsg_exit
_XcptFilter
free
_purecall
wcsncmp
_CxxThrowException
_vsnprintf_s
memcpy_s
_vsnwprintf
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
_callnewh
wcschr
??1exception@@UAE@XZ
_unlock
memset
api-ms-win-shcore-taskpool-l1-1-0
SHTaskPoolQueueTask
shell32
ord916
ShellExecuteExW
ord155
SHChangeNotifySuspendResume
ord190
ShellExecuteW
dui70
?GetClassInfoPtr@TouchCheckBox@DirectUI@@SGPAUIClassInfo@2@XZ
?GetClassInfoPtr@TouchHyperLink@DirectUI@@SGPAUIClassInfo@2@XZ
UnInitProcessPriv
InitProcessPriv
?VisibleProp@Element@DirectUI@@SGPBUPropertyInfo@2@XZ
?SetValue@Element@DirectUI@@QAEJP6GPBUPropertyInfo@2@XZHPAVValue@2@@Z
?CreateBool@Value@DirectUI@@SGPAV12@_N@Z
?_ZeroRelease@Value@DirectUI@@AAEXXZ
StrToID
?GetCheckedState@TouchCheckBox@DirectUI@@QAE?AW4CheckedStateFlags@2@XZ
?MultipleClick@TouchButton@DirectUI@@SG?AVUID@@XZ
?Click@TouchButton@DirectUI@@SG?AVUID@@XZ
?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z
?CreateElement@DUIXmlParser@DirectUI@@QAEJPBGPAVElement@2@1PAKPAPAV32@@Z
?SetXMLFromResource@DUIXmlParser@DirectUI@@QAEJIPAUHINSTANCE__@@0@Z
?Create@DUIXmlParser@DirectUI@@SGJPAPAV12@P6GPAVValue@2@PBGPAX@Z2P6GX11H2@Z2@Z
?Destroy@DUIXmlParser@DirectUI@@QAEXXZ
InitThread
UnInitThread
?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-processthreads-l1-1-0
CreateProcessAsUserW
GetCurrentThread
OpenThreadToken
OpenProcessToken
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
api-ms-win-core-heap-l1-1-0
HeapAlloc
HeapFree
GetProcessHeap
api-ms-win-core-libraryloader-l1-2-0
LoadStringW
GetModuleHandleW
GetModuleFileNameA
GetProcAddress
LoadResource
GetModuleHandleExW
FindResourceExW
LockResource
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
GetLastError
SetLastError
SetUnhandledExceptionFilter
api-ms-win-core-synch-l1-1-0
ReleaseMutex
ReleaseSemaphore
SetEvent
OpenSemaphoreW
WaitForSingleObject
CreateMutexExW
CreateSemaphoreExW
CreateEventW
WaitForSingleObjectEx
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-heap-l2-1-0
LocalFree
LocalAlloc
api-ms-win-core-com-l1-1-0
CoCreateFreeThreadedMarshaler
CoTaskMemFree
CoInitializeEx
CoTaskMemAlloc
CoGetMalloc
CoUninitialize
CoTaskMemRealloc
CoCreateInstance
api-ms-win-security-base-l1-1-0
EqualSid
GetTokenInformation
DuplicateTokenEx
AllocateAndInitializeSid
FreeSid
crypt32
CryptStringToBinaryA
CryptBinaryToStringW
api-ms-win-security-credentials-l1-1-0
CredUnprotectW
rpcrt4
RpcRevertToSelf
RpcImpersonateClient
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingSetAuthInfoExW
RpcStringFreeW
NdrClientCall4
RpcBindingFree
api-ms-win-security-sddl-l1-1-0
ConvertStringSidToSidW
api-ms-win-eventing-provider-l1-1-0
EventWriteTransfer
EventRegister
EventUnregister
EventSetInformation
api-ms-win-core-processthreads-l1-1-1
OpenProcess
api-ms-win-core-psapi-l1-1-0
QueryFullProcessImageNameW
api-ms-win-core-registry-l1-1-0
RegOpenCurrentUser
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
api-ms-win-core-sysinfo-l1-1-0
GetSystemWindowsDirectoryW
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-registry-l1-1-1
RegDeleteKeyValueW
RegSetKeyValueW
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-string-l1-1-0
CompareStringOrdinal
api-ms-win-eventing-classicprovider-l1-1-0
TraceMessage
api-ms-win-service-management-l1-1-0
OpenServiceW
CloseServiceHandle
OpenSCManagerW
StartServiceW
api-ms-win-service-winsvc-l1-1-0
QueryServiceStatus
api-ms-win-appmodel-runtime-l1-1-0
GetPackageFullName
GetPackageFamilyName
GetCurrentPackageInfo
GetPackageInfo
OpenPackageInfoByFullName
ClosePackageInfo
ntdll
RtlFreeHeap
NtQueryInformationToken
RtlInitUnicodeString
RtlAllocateHeap
RtlNtStatusToDosErrorNoTeb
RtlCompareUnicodeString
user32
MsgWaitForMultipleObjects
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Exports
Exports
EdpPlatform_QueryUserSessionState
EdpPlatform_RegisterUserSessionNotification
EdpPlatform_ShowDialog
EdpPlatform_ShowUI
EdpPlatform_UnregisterUserSessionNotification
EfsPlatform_GetCallerID
EfsPlatform_IsCallerAutomaticallyDelegated
EfsPlatform_LaunchPromptUI
EfsPlatform_SuspendNotificationsAndEncryptFile
EfsPlatform_UnpackSecurePin
FVE_LaunchConsentPromptUI
FVE_LaunchSDCardUI
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ