EditBufferTestHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
EditBufferTestHook.dll
Resource
win10v2004-20240508-en
General
-
Target
EditBufferTestHook.dll
-
Size
66KB
-
MD5
2e79a25963e501876c2a83f8e828ae06
-
SHA1
ba79f2cd508e731687d147d0c2e8d492a731c6e1
-
SHA256
1aa276ea0d76d59d1b83ed3a867b6428130f2642415b9a0cd0d49cb396c5e5aa
-
SHA512
fe5db6bd2c5b884cc3a03cc38818d766d1b4c3ebd80144f728691eeb49f1e5a2e09939eada1e02280690f09fd4b4f1b031efa58a2478ca7ee36704b1555f9556
-
SSDEEP
1536:XUzQPOxJVCTv+LfXWeEkQ4dB5Tk7WxweZ8eeEWi:kzQiVCTv+bWm5Tk7WxweCeZP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EditBufferTestHook.dll
Files
-
EditBufferTestHook.dll.dll windows:10 windows x86 arch:x86
61578e1d2cf06eda13a81b4d9487caf4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_wcsdup
_except_handler4_common
abort
__uncaught_exception
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@XZ
_callnewh
memset
_ismbblead
_onexit
_errno
___mb_cur_max_func
calloc
__dllonexit
___lc_codepage_func
___lc_handle_func
__pctype_func
memcpy
__CxxFrameHandler3
_CxxThrowException
setlocale
_vsnwprintf
_vsnprintf_s
_unlock
_lock
_beginthreadex
?what@exception@@UBEPBDXZ
_purecall
memcpy_s
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
??0bad_cast@@QAE@PBD@Z
??1type_info@@UAE@XZ
strcspn
_free_locale
malloc
_initterm
sprintf_s
??_V@YAXPAX@Z
_get_current_locale
localeconv
_amsg_exit
_XcptFilter
??0exception@@QAE@ABV0@@Z
free
__crtLCMapStringW
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memmove
??3@YAXPAX@Z
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventWrite
EventSetInformation
EventRegister
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-errorhandling-l1-1-1
GetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
api-ms-win-core-synch-l1-2-0
ReleaseSemaphore
CreateSemaphoreExW
WaitForSingleObject
ReleaseMutex
WaitForSingleObjectEx
SetEvent
CreateEventW
InitializeCriticalSectionEx
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
OpenSemaphoreW
CreateMutexExW
api-ms-win-core-registry-l1-1-0
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
api-ms-win-core-util-l1-1-0
DecodePointer
EncodePointer
api-ms-win-core-localization-l1-2-1
FormatMessageW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-processthreads-l1-1-2
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
api-ms-win-core-sysinfo-l1-2-1
GetSystemTimeAsFileTime
GetTickCount
coremessaging
CoreUICreate
coreuicomponents
CoreUIFactoryCreate
CoreUIClientCreate
api-ms-win-security-sddl-l1-1-0
ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleExW
GetProcAddress
FreeLibrary
GetModuleFileNameA
LoadLibraryExW
api-ms-win-core-heap-l2-1-0
LocalFree
api-ms-win-core-heap-l1-2-0
HeapFree
HeapAlloc
GetProcessHeap
api-ms-win-core-debug-l1-1-1
OutputDebugStringW
Exports
Exports
CreateEditBufferTestHook
CreateEditBufferTestHookClient
EnableTestHook
GetTestHookEnabled
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ