dot3HC.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dot3hc.dll
Resource
win10v2004-20240508-en
General
-
Target
dot3hc.dll
-
Size
56KB
-
MD5
d6204d0a732dd50d6614788857e8f38d
-
SHA1
2ab2c6fb4b10c612b10af43279a5c38b048f617a
-
SHA256
0807fb909060249df63c15f9abe6e0a87c58a65e6ad60a410a4d2fa8e57e91b5
-
SHA512
e59a96883bd3baa5e6b531d305934b17251185575d9fec82b92bee526a7d15684fac546725544aa8a86e9afd7eee5c5d7851a6e0518e36a1530590b8c51a2fbb
-
SSDEEP
1536:5S+keJAxghbsupa3ArWH40j5aIIDEfA/2ZWV+J6:5S+knYgupyArWH4a5LIDFuZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dot3hc.dll
Files
-
dot3hc.dll.dll regsvr32 windows:10 windows x86 arch:x86
c12008b2160046aa70bfc6d0bfa4251a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
?what@exception@@UBEPBDXZ
_amsg_exit
_CxxThrowException
memcpy
??1exception@@UAE@XZ
_initterm
?terminate@@YAXXZ
_lock
??0exception@@QAE@ABV0@@Z
__dllonexit
_onexit
_except_handler4_common
memmove
??1type_info@@UAE@XZ
_errno
??3@YAXPAX@Z
memmove_s
_callnewh
??0exception@@QAE@ABQBD@Z
_unlock
??0exception@@QAE@ABQBDH@Z
wcsnlen
wcsstr
toupper
wcscat_s
wcscpy_s
vswprintf_s
_vscwprintf
memcpy_s
free
malloc
wcsncpy_s
wcsncmp
_purecall
??_V@YAXPAX@Z
__CxxFrameHandler3
_XcptFilter
realloc
memset
kernel32
GetModuleFileNameA
LocalAlloc
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
OutputDebugStringA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
LockResource
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleW
lstrcmpiW
RaiseException
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceExW
GetModuleFileNameW
InitializeCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
GetThreadLocale
SetThreadLocale
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
HeapDestroy
advapi32
RegOpenKeyExW
EventWriteTransfer
EventRegister
EventProviderEnabled
EventSetInformation
EventUnregister
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
user32
LoadStringW
UnregisterClassA
CharNextW
oleaut32
RegisterTypeLi
SysStringLen
SysAllocString
UnRegisterTypeLi
VarUI4FromStr
SysFreeString
LoadTypeLi
nsi
NsiGetAllParameters
NsiGetParameter
iphlpapi
GetAdaptersAddresses
ConvertInterfaceGuidToLuid
ConvertInterfaceLuidToIndex
api-ms-win-core-com-l1-1-0
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ