eappprxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eappprxy.dll
Resource
win10v2004-20240226-en
General
-
Target
eappprxy.dll
-
Size
54KB
-
MD5
d7c38b5c2c7c361b8554027e6e992ade
-
SHA1
99b5545dd2fdc70f55ee81f6a41751d021c4a8c7
-
SHA256
7a67fcfbd2792f94f3640c00ffe07e579d3bc685262017a846e3710281d324ef
-
SHA512
60a395219b192a90d97749643ec81b53b254957b2784951ba34b2b7c26e494a580bd3ca6e4640bc518a254ec9559c9a8a748e34ecbc9df0f10a52bf356d1ae41
-
SSDEEP
1536:udH+07nTLL5bkieKE/UbIzqGi7XqRX6uAO:uF+wPbIZPAO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eappprxy.dll
Files
-
eappprxy.dll.dll windows:10 windows x86 arch:x86
52f721f3ac8bbb1891c4d03c83ee03de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_XcptFilter
??0exception@@QAE@ABQBD@Z
_amsg_exit
free
_initterm
memmove
memcpy
_CxxThrowException
_except_handler4_common
??1type_info@@UAE@XZ
_lock
_unlock
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBDH@Z
__dllonexit
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
_onexit
_vsnprintf
wcsrchr
_purecall
__CxxFrameHandler3
_beginthreadex
memcpy_s
malloc
memset
ntdll
EtwEventEnabled
DbgPrint
EtwEventUnregister
EtwEventRegister
EtwEventWriteTransfer
EtwUnregisterTraceGuids
EtwRegisterTraceGuidsW
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwTraceMessage
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-libraryloader-l1-2-0
GetModuleFileNameW
DisableThreadLibraryCalls
GetModuleHandleExW
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
api-ms-win-core-sysinfo-l1-1-0
GetSystemInfo
GetTickCount
GetSystemTimeAsFileTime
GetVersionExW
api-ms-win-core-synch-l1-1-0
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjectsEx
CreateEventW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
SetEvent
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-heap-l1-1-0
HeapFree
HeapAlloc
HeapSize
GetProcessHeap
api-ms-win-core-debug-l1-1-0
DebugBreak
IsDebuggerPresent
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Exports
Exports
EapHostPeerBeginSession
EapHostPeerClearConnection
EapHostPeerEndSession
EapHostPeerFreeEapError
EapHostPeerFreeRuntimeMemory
EapHostPeerGetAuthStatus
EapHostPeerGetDataToUnplumbCredentials
EapHostPeerGetEncryptedPassword
EapHostPeerGetIdentity
EapHostPeerGetResponseAttributes
EapHostPeerGetResult
EapHostPeerGetSendPacket
EapHostPeerGetUIContext
EapHostPeerInitialize
EapHostPeerProcessReceivedPacket
EapHostPeerSetResponseAttributes
EapHostPeerSetUIContext
EapHostPeerUninitialize
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ