C:\Users\code-test\Desktop\HelloWorld_new\x64\Release\dynamic.pdb
Static task
static1
Behavioral task
behavioral1
Sample
25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945.dll
Resource
win10v2004-20240508-en
General
-
Target
25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945
-
Size
257KB
-
MD5
b117dd1b9e8c35999df5e0fdac740646
-
SHA1
6602d94c8c1ae839428782ec4294aae5239e9bec
-
SHA256
25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945
-
SHA512
f2786670b3da7fb2c969887d456516a2e672186d4443c007852121f9bd6359c6c1d48b9170780c815033afa859905d9fa283c16f64706182e110c9525ad4cf83
-
SSDEEP
3072:LhWzkjx/jwhFBFfQnSQxRAqwbPosNVm987/IkU9YWTM5L1U/qEzWYQoYM9EpfV:Lj8hZfaSQxRBwb/jLsysokYt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945
Files
-
25a77986340d36e56320856bcc826c24fe1365223f0511b8e751424a1fd17945.dll windows:6 windows x64 arch:x64
35e23d13988163d3728d1a1179cf09a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
wininet
InternetOpenW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetCloseHandle
HttpOpenRequestW
kernel32
TlsAlloc
WriteConsoleW
CloseHandle
CreateFileW
OutputDebugStringA
DebugBreak
MultiByteToWideChar
WideCharToMultiByte
SetFilePointerEx
GetConsoleMode
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStringTypeW
InitOnceComplete
InitOnceBeginInitialize
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
LCMapStringEx
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
HeapSize
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
ws2_32
InetNtopW
Exports
Exports
RegisterModule
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ