EditBufferTestHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
EditBufferTestHook.dll
Resource
win10v2004-20240508-en
General
-
Target
EditBufferTestHook.dll
-
Size
66KB
-
MD5
8cf2878fb7099dd86c445a5d96706da5
-
SHA1
397d6e701f6de5deaae7f869dc2c35d8964f9675
-
SHA256
0d68b51e722486d4eb4753ea16f2aba8f7ca0f0a99f0387937578452c34b3dd9
-
SHA512
f9ecb577d6073a1bda624780bd6bd3482956bf9a238ba8aca57e1010017c73408b2479a2f43b98575ac27cd0e8577036d2afed80f62520fa93a8610ff5082a67
-
SSDEEP
1536:jUG+cmxJVCTv+LfXWeEkQ4dB5Tk7WKweZ8TdEWi:4G+XVCTv+bWm5Tk7WKweCTCP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EditBufferTestHook.dll
Files
-
EditBufferTestHook.dll.dll windows:10 windows x86 arch:x86
61578e1d2cf06eda13a81b4d9487caf4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_wcsdup
_except_handler4_common
abort
__uncaught_exception
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@XZ
_callnewh
memset
_ismbblead
_onexit
_errno
___mb_cur_max_func
calloc
__dllonexit
___lc_codepage_func
___lc_handle_func
__pctype_func
memcpy
__CxxFrameHandler3
_CxxThrowException
setlocale
_vsnwprintf
_vsnprintf_s
_unlock
_lock
_beginthreadex
?what@exception@@UBEPBDXZ
_purecall
memcpy_s
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
??0bad_cast@@QAE@PBD@Z
??1type_info@@UAE@XZ
strcspn
_free_locale
malloc
_initterm
sprintf_s
??_V@YAXPAX@Z
_get_current_locale
localeconv
_amsg_exit
_XcptFilter
??0exception@@QAE@ABV0@@Z
free
__crtLCMapStringW
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memmove
??3@YAXPAX@Z
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventWrite
EventSetInformation
EventRegister
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-errorhandling-l1-1-1
GetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
api-ms-win-core-synch-l1-2-0
ReleaseSemaphore
CreateSemaphoreExW
WaitForSingleObject
ReleaseMutex
WaitForSingleObjectEx
SetEvent
CreateEventW
InitializeCriticalSectionEx
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
OpenSemaphoreW
CreateMutexExW
api-ms-win-core-registry-l1-1-0
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
api-ms-win-core-util-l1-1-0
DecodePointer
EncodePointer
api-ms-win-core-localization-l1-2-1
FormatMessageW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-processthreads-l1-1-2
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
api-ms-win-core-sysinfo-l1-2-1
GetSystemTimeAsFileTime
GetTickCount
coremessaging
CoreUICreate
coreuicomponents
CoreUIFactoryCreate
CoreUIClientCreate
api-ms-win-security-sddl-l1-1-0
ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleExW
GetProcAddress
FreeLibrary
GetModuleFileNameA
LoadLibraryExW
api-ms-win-core-heap-l2-1-0
LocalFree
api-ms-win-core-heap-l1-2-0
HeapFree
HeapAlloc
GetProcessHeap
api-ms-win-core-debug-l1-1-1
OutputDebugStringW
Exports
Exports
CreateEditBufferTestHook
CreateEditBufferTestHookClient
EnableTestHook
GetTestHookEnabled
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ