eappprxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eappprxy.dll
Resource
win10v2004-20240426-en
General
-
Target
eappprxy.dll
-
Size
54KB
-
MD5
e23a5d777de348508454eb92a5a11c8f
-
SHA1
9e88c4936b3b9cede98df9569731c449f30d802d
-
SHA256
44b791fc432e86cb612e7d078765dc94436c5dba0103d539eeda906db0a7538b
-
SHA512
e6c72eda1f6bd55c3fca11817a4721dcc7d8be07e200eeca21736e7efa3de2d1fab835db9b1fafcf7623d991a66e769c1acd0234b81238658d5adb90f737d780
-
SSDEEP
1536:xdH+p7nTLL5bkieKE/UbIzqGi7Xq8X0uUQ:xF+hPbI05UQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eappprxy.dll
Files
-
eappprxy.dll.dll windows:10 windows x86 arch:x86
52f721f3ac8bbb1891c4d03c83ee03de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_XcptFilter
??0exception@@QAE@ABQBD@Z
_amsg_exit
free
_initterm
memmove
memcpy
_CxxThrowException
_except_handler4_common
??1type_info@@UAE@XZ
_lock
_unlock
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBDH@Z
__dllonexit
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
_onexit
_vsnprintf
wcsrchr
_purecall
__CxxFrameHandler3
_beginthreadex
memcpy_s
malloc
memset
ntdll
EtwEventEnabled
DbgPrint
EtwEventUnregister
EtwEventRegister
EtwEventWriteTransfer
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwTraceMessage
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-libraryloader-l1-2-0
GetModuleFileNameW
DisableThreadLibraryCalls
GetModuleHandleExW
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
api-ms-win-core-sysinfo-l1-1-0
GetSystemInfo
GetTickCount
GetSystemTimeAsFileTime
GetVersionExW
api-ms-win-core-synch-l1-1-0
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjectsEx
CreateEventW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
SetEvent
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-heap-l1-1-0
HeapFree
HeapAlloc
HeapSize
GetProcessHeap
api-ms-win-core-debug-l1-1-0
DebugBreak
IsDebuggerPresent
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Exports
Exports
EapHostPeerBeginSession
EapHostPeerClearConnection
EapHostPeerEndSession
EapHostPeerFreeEapError
EapHostPeerFreeRuntimeMemory
EapHostPeerGetAuthStatus
EapHostPeerGetDataToUnplumbCredentials
EapHostPeerGetEncryptedPassword
EapHostPeerGetIdentity
EapHostPeerGetResponseAttributes
EapHostPeerGetResult
EapHostPeerGetSendPacket
EapHostPeerGetUIContext
EapHostPeerInitialize
EapHostPeerProcessReceivedPacket
EapHostPeerSetResponseAttributes
EapHostPeerSetUIContext
EapHostPeerUninitialize
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ