ConnectedAccountState.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ConnectedAccountState.dll
Resource
win10v2004-20240508-en
General
-
Target
ConnectedAccountState.dll
-
Size
48KB
-
MD5
dba30c73ea21e37e55619e0cfcdc5de2
-
SHA1
54251d04b1719933797bcc6d6e83139f8a90040c
-
SHA256
cacc4b2b3588e6872c55942689a9d916bfaf861e19660b543931226c82b53058
-
SHA512
2fd691add5ed3111fa7cd54ebcbb2841cdf438e52d0320d68d09de1a3dd34cb8c288d0ecce87d9b3e62244937f388a7c6f48f4f3a7c423ed0e0a03bcf1c31850
-
SSDEEP
768:lNvjUl2mWIWvGPsGss2Gjh4PR8O33zV9R00iW3f76GeI7Y:lNrUNtU+jh4P+uR00i87JeI7Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ConnectedAccountState.dll
Files
-
ConnectedAccountState.dll.dll windows:10 windows x86 arch:x86
db10de04a8fb3f51edfe1ceaaf491b3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_unlock
__dllonexit
_CxxThrowException
_onexit
__CxxFrameHandler3
_lock
_callnewh
?what@exception@@UBEPBDXZ
_XcptFilter
??1type_info@@UAE@XZ
_except_handler4_common
memcpy
_initterm
_purecall
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
realloc
free
malloc
memcpy_s
memmove_s
_get_errno
_vsnwprintf
_set_errno
_amsg_exit
memcmp
memset
api-ms-win-core-com-l1-1-0
CoTaskMemRealloc
CLSIDFromString
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateFreeThreadedMarshaler
CoGetApartmentType
CoWaitForMultipleHandles
CoTaskMemAlloc
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
RaiseException
GetLastError
api-ms-win-eventing-classicprovider-l1-1-0
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventRegister
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-registry-l1-1-0
RegSetValueExW
RegCloseKey
RegGetValueW
RegOpenCurrentUser
RegOpenKeyExW
RegCreateKeyExW
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-winrt-error-l1-1-0
RoOriginateError
RoTransformError
api-ms-win-core-winrt-string-l1-1-0
WindowsCreateStringReference
WindowsCreateString
api-ms-win-core-synch-l1-1-0
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
AcquireSRWLockShared
WaitForSingleObjectEx
InitializeSRWLock
CreateMutexExW
CreateEventExW
CreateSemaphoreExW
SetEvent
OpenSemaphoreW
ReleaseMutex
WaitForSingleObject
ReleaseSRWLockShared
ReleaseSemaphore
api-ms-win-core-winrt-l1-1-0
RoGetActivationFactory
RoActivateInstance
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
GetModuleHandleExW
GetModuleFileNameA
GetModuleHandleW
api-ms-win-core-heap-l1-1-0
HeapAlloc
HeapFree
GetProcessHeap
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
IsDebuggerPresent
DebugBreak
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Exports
Exports
ActionCenterRunDllW
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ