C:\Users\admin\Documents\Visual Studio 2012\Projects\downloader_dll_http_mtfs\Release\downloader_dll_http_mtfs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26.dll
Resource
win10v2004-20240508-en
General
-
Target
de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26.dll
-
Size
396KB
-
MD5
b3cf56d0b20c4fde35309665796f805c
-
SHA1
bdefef3e32fb01eeaa12e15e53ae498318a61947
-
SHA256
de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26
-
SHA512
0960a1b95e5924b2800987653521a8d3a304f9a4e730a0d3c95ee88d75101acbce493cfe6beb572075638249ea00ffc87c1477fbd0442bb36338b62dcb261810
-
SSDEEP
1536:LCwKRsJ5ucqow+cdl4ScsWjcdIjVuyjCgAV:LCwKRkvGl1IjVuyOgAV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26.dll
Files
-
de400840b917c33a82ba316ae244d8691ec0f5a1fd81d7d24763c0513985fe26.dll.dll windows:5 windows x86 arch:x86
1302f0a89177be8c5819bbdb67f1d5f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadLibraryW
GetProcAddress
GetTickCount
Sleep
LoadLibraryA
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
HeapAlloc
EncodePointer
DecodePointer
RaiseException
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetProcessHeap
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WriteFile
GetModuleFileNameW
LoadLibraryExW
RtlUnwind
HeapReAlloc
GetStringTypeW
OutputDebugStringW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
Exports
Exports
?Applicate@@YGHXZ
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ