EditBufferTestHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
EditBufferTestHook.dll
Resource
win10v2004-20240508-en
General
-
Target
EditBufferTestHook.dll
-
Size
73KB
-
MD5
1ce55292e4ee877fa9ed390b07a750e9
-
SHA1
678f2b72dd1008d95536af3df9ac9b2a4fcdb355
-
SHA256
8de74d22a20e2ed66912152adb206134e07feab97057762990cd538b7f73aec8
-
SHA512
3d8dcff9571954debfb048b5e20db3fbd3c881e0e282fa040fef6eb010138feba5f16a99f2e873e703466832cdc34daed0e408457af9b445d56021383fc639d0
-
SSDEEP
1536:B+GFzZ6zA3pju7XJhdOt5dNGrco0Xp0YJG6jbGliKen0kJiMsaRbdMO4o:B+u6MOX3zr6pDlqls0k4MseMO4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EditBufferTestHook.dll
Files
-
EditBufferTestHook.dll.dll windows:10 windows x86 arch:x86
6296eebb4c2baf9054ee09213cb26d13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
memcpy_s
_wsetlocale
__crtLCMapStringW
_wcsdup
abort
__uncaught_exception
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@XZ
_callnewh
memset
_ismbblead
_errno
_vsnwprintf
_vsnprintf_s
___mb_cur_max_func
calloc
__CxxFrameHandler3
___lc_codepage_func
___lc_handle_func
_except_handler4_common
__pctype_func
_onexit
memmove
__dllonexit
memcpy
??1type_info@@UAE@XZ
_CxxThrowException
setlocale
_unlock
?terminate@@YAXXZ
_lock
_initterm
_beginthreadex
_amsg_exit
?what@exception@@UBEPBDXZ
_XcptFilter
_purecall
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
??0bad_cast@@QAE@PBD@Z
strcspn
malloc
sprintf_s
localeconv
??0exception@@QAE@ABV0@@Z
free
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
??_V@YAXPAX@Z
??3@YAXPAX@Z
api-ms-win-eventing-provider-l1-1-0
EventWriteTransfer
EventSetInformation
EventRegister
EventUnregister
api-ms-win-core-errorhandling-l1-1-3
TerminateProcessOnMemoryExhaustion
api-ms-win-core-errorhandling-l1-1-2
RaiseFailFastException
api-ms-win-core-debug-l1-1-0
DebugBreak
OutputDebugStringW
IsDebuggerPresent
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
SetLastError
GetLastError
UnhandledExceptionFilter
api-ms-win-core-synch-l1-1-0
CreateMutexExW
LeaveCriticalSection
OpenSemaphoreW
WaitForSingleObjectEx
EnterCriticalSection
ReleaseMutex
InitializeCriticalSectionEx
ReleaseSemaphore
CreateSemaphoreExW
SetEvent
WaitForSingleObject
CreateEventW
DeleteCriticalSection
api-ms-win-core-registry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-util-l1-1-0
EncodePointer
DecodePointer
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
coremessaging
CoreUICreate
coreuicomponents
CoreUIFactoryCreate
CoreUIClientCreate
api-ms-win-security-sddl-l1-1-0
ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-heap-l2-1-0
LocalFree
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
GetModuleHandleExW
GetModuleFileNameA
GetModuleHandleW
api-ms-win-core-heap-l1-1-0
GetProcessHeap
HeapFree
HeapAlloc
Exports
Exports
CreateEditBufferTestHook
CreateEditBufferTestHookClient
EnableTestHook
GetTestHookEnabled
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ