cabview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cabview.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cabview.dll
Resource
win10v2004-20240508-en
General
-
Target
cabview.dll
-
Size
129KB
-
MD5
41e215f560028dbaa897deaef8390a7a
-
SHA1
889485112dce89e9c82c705b953aebb9b47ca658
-
SHA256
df2a8c82625e0c1b2cac1cffadf7b8cdda262aa0a794fb4f83f4aba0ece4e39e
-
SHA512
f89bdb4f54fa066d01b701f8d29a5a7558a60f7dc742799a3cd660c10bc8baa0ec478886bec866217c04cec396d5c8bc16c31bd9363408d948d456c890189a4b
-
SSDEEP
1536:y6eqWn86prnHih9INDnGObba4rhE+AuNjWrcYah9h1AXMKXHaZln5IUmDzoXR:Aq88yCgNDnGOb+ahXNqJohealn5I8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cabview.dll
Files
-
cabview.dll.dll windows:6 windows x86 arch:x86
8f1cfe0553fdb6057bd124a284197680
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_except_handler4_common
memmove
_amsg_exit
_initterm
memset
_XcptFilter
free
malloc
memcpy
_vsnwprintf
kernel32
CreateFileW
GlobalAlloc
_llseek
_lread
_lwrite
GlobalFree
lstrlenA
_lclose
GetTempFileNameW
GetTempPathW
InterlockedIncrement
InterlockedDecrement
LocalAlloc
lstrcmpiW
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFilePointer
ReadFile
GetFileSizeEx
GetShortPathNameW
CloseHandle
lstrlenW
HeapAlloc
GetProcessHeap
HeapFree
SetThreadPriority
GetCurrentThread
GetSystemDirectoryW
DelayLoadFailureHook
GetProcAddress
GetLastError
FreeLibrary
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LoadLibraryW
GetModuleFileNameW
DeactivateActCtx
ActivateActCtx
ReleaseActCtx
CreateActCtxW
GetModuleHandleW
user32
SetMenuDefaultItem
LoadMenuW
GetSubMenu
RemoveMenu
DestroyMenu
GetMenuItemCount
InsertMenuW
GetMenuItemInfoW
CreatePopupMenu
InsertMenuItemW
DeleteMenu
MessageBoxW
RegisterClipboardFormatW
SetCursor
LoadCursorW
SendMessageW
SetWindowTextW
LoadStringW
shlwapi
ord476
PathAddBackslashA
PathFindFileNameA
PathFindFileNameW
ord215
ord217
PathCombineW
ord219
ord199
ord186
ord216
ord172
ord158
PathAppendW
AssocCreate
PathFindExtensionW
StrRetToBufW
SHStrDupW
PathSkipRootW
PathIsUNCW
shell32
ord744
SHBindToFolderIDListParentEx
ShellExecuteW
AssocGetDetailsOfPropKey
ord743
SHGetFileInfoW
SHGetPathFromIDListW
ord256
ord701
ord18
ord846
ord19
ord27
SHGetPathFromIDListA
SHBrowseForFolderW
ord155
ord681
SHBindToParent
SHBindToObject
ord152
propsys
InitVariantFromStrRet
PSFormatForDisplay
VariantToPropVariant
VariantCompare
InitVariantFromFileTime
ole32
CoInitializeEx
PropVariantClear
CoUninitialize
OleSetClipboard
CoCreateInstance
oleaut32
SysAllocString
VariantClear
VariantInit
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Uninstall
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ