dplayx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dplayx.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dplayx.dll
Resource
win10v2004-20240508-en
General
-
Target
dplayx.dll
-
Size
208KB
-
MD5
19dfabf1712ca77c34ebd92a893e9b2e
-
SHA1
a7b89a9048ca8432d02d5cff807068cc17bf77a2
-
SHA256
5e2798ec0ad60ad5e36edd637628f9ebe2842160c9b9f865300adcb686409ba7
-
SHA512
a8c08320f088a3de9cff581cb93df255f90d41db5c980cca4817fb14f8b881be236aa91afbf0ad8b3bf0530b8dd2753d95f1c3f322ee0284dbcd9ea2c506d66f
-
SSDEEP
6144:IYqTCykDHlTD8+dUYiskAo9/DvfTGn3lbVUTBc5tkPpdHmGxAKNMrf0:Nw5anliWY/JN7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dplayx.dll
Files
-
dplayx.dll.dll regsvr32 windows:6 windows x86 arch:x86
65198063b2463de11928873315bb4b9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_except_handler4_common
_amsg_exit
_initterm
free
_XcptFilter
srand
memmove
_vsnwprintf
_vsnprintf
memset
_memicmp
memcpy
malloc
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcessId
CreateMutexA
CreateEventA
MapViewOfFile
GetLastError
CreateFileMappingA
ReleaseMutex
SetEvent
WaitForSingleObject
GetTickCount
CreateThread
ResetEvent
lstrlenA
Sleep
FreeLibrary
GetVersionExA
DuplicateHandle
GetCurrentProcess
LoadLibraryW
LoadLibraryA
InitializeCriticalSection
CreateEventW
CreateMutexW
CreateFileMappingW
OpenFileMappingW
OpenFileMappingA
CreateProcessW
CreateProcessA
GetCurrentDirectoryW
GetCurrentDirectoryA
DeleteCriticalSection
CompareStringA
GetProfileIntA
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
DisableThreadLibraryCalls
LocalFree
HeapAlloc
HeapFree
HeapReAlloc
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
ExitThread
WaitForMultipleObjects
OpenProcess
ResumeThread
TerminateProcess
GlobalFree
GlobalAlloc
ReleaseSemaphore
CreateSemaphoreA
InterlockedCompareExchange
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
CompareStringW
rpcrt4
UuidCreate
advapi32
RegOpenKeyA
RegQueryInfoKeyW
RegDeleteKeyA
RegDeleteKeyW
RegCreateKeyExA
RegCreateKeyExW
RegDeleteValueA
RegDeleteValueW
RegEnumValueA
RegEnumValueW
RegSetValueExA
RegSetValueExW
RegEnumKeyExA
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegLoadMUIStringW
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
winmm
timeGetDevCaps
timeKillEvent
timeSetEvent
timeGetTime
ntdll
ord1
Exports
Exports
DirectPlayCreate
DirectPlayEnumerate
DirectPlayEnumerateA
DirectPlayEnumerateW
DirectPlayLobbyCreateA
DirectPlayLobbyCreateW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gdwDPlaySPRefCount
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ