basesrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
basesrv.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
basesrv.dll
Resource
win10v2004-20240508-en
General
-
Target
basesrv.dll
-
Size
43KB
-
MD5
5e7c5de85af978495c3a9a0b720b9811
-
SHA1
0f01b977d6ca37dfdfb136da4b31f8554fd07d5b
-
SHA256
142cdebed78e3baee8d2dbf6a97ce26313932024010548ec2e570cae480af7c3
-
SHA512
e24f6ca54b2f6d52e04fae07387a307342bf94173ebb6276af28e04569af5d6a6250e3736e9a65ce8edcbe9dac599311fbacbe38cd7d598e2454e5e054954ee2
-
SSDEEP
768:LzSsx70ilm/xV5w4IIXnOgyWx1ldCEO4NJZkIb:LzxBDlmZXOgRCEVNJ6I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource basesrv.dll
Files
-
basesrv.dll.dll windows:6 windows x86 arch:x86
6c9be0b48a7fd11b37bd7831cf2d04c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntdll
NtClose
NtQueryValueKey
NtOpenKey
RtlReleaseSRWLockExclusive
LdrGetProcedureAddress
RtlInitString
LdrGetDllHandle
RtlAcquireSRWLockExclusive
RtlPrefixUnicodeString
NtQueryObject
RtlCopyLuid
NtQueryInformationToken
NtOpenProcessToken
NtOpenThreadToken
NtOpenSymbolicLinkObject
wcsncpy_s
LdrUnloadDll
LdrLoadDll
NtCreateSymbolicLinkObject
RtlInitializeCriticalSectionAndSpinCount
NtQueryInformationProcess
NtSetInformationObject
NtCreateDirectoryObject
RtlSetSaclSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlDeleteCriticalSection
_wcsicmp
RtlInitUnicodeStringEx
RtlQueryRegistryValues
swprintf_s
wcscpy_s
wcscat_s
RtlCreateUnicodeString
RtlExpandEnvironmentStrings_U
RtlInitializeCriticalSection
RtlCreateTagHeap
memcpy
RtlExitUserThread
RtlLeaveCriticalSection
RtlEnterCriticalSection
NtQuerySystemInformation
NtMakePermanentObject
RtlFreeSid
_wcsnicmp
NtMakeTemporaryObject
NtQuerySymbolicLinkObject
memmove
wcsnlen
_snwprintf_s
RtlUpcaseUnicodeChar
NtSetInformationThread
NtDuplicateToken
NtOpenThread
NtSetInformationProcess
NtDuplicateObject
NtOpenProcess
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
memset
NtCreateEvent
NtSetEvent
RtlEqualSid
RtlOpenCurrentUser
NtVdmControl
RtlCopyUnicodeString
NtCompareTokens
NtResetEvent
DbgPrint
NtNotifyChangeKey
RtlCopySid
NtCreateKey
RtlEqualUnicodeString
NtEnumerateKey
NtEnumerateValueKey
RtlUnlockHeap
RtlLockHeap
LdrDisableThreadCalloutsForDll
NtTerminateProcess
RtlUnhandledExceptionFilter
RtlUnwind
RtlAllocateAndInitializeSid
RtlLengthSid
RtlAllocateHeap
RtlCreateAcl
RtlAddAccessAllowedAce
RtlAddMandatoryAce
RtlFreeHeap
RtlInitUnicodeString
RtlCreateUserThread
RtlReAllocateHeap
NtQueryMultipleValueKey
csrsrv
CsrCreateProcess
CsrLockProcessByClientId
CsrCreateThread
CsrUnlockProcess
CsrIsClientSandboxed
CsrImpersonateClient
CsrRevertToSelf
CsrValidateMessageBuffer
CsrDestroyProcess
Exports
Exports
BaseSetProcessCreateNotify
BaseSrvNlsLogon
BaseSrvNlsUpdateRegistryCache
BaseSrvRegisterSxS
ServerDllInitialization
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ