acppage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
acppage.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acppage.dll
Resource
win10v2004-20240508-en
General
-
Target
acppage.dll
-
Size
43KB
-
MD5
20e495a96048217db8453175034f5f7d
-
SHA1
f6f6f0cb931ba657433aa7c209d4cc259f71a2fa
-
SHA256
db0ce34cd152cddc6411883dea8150142e7fda4c8dbdea0e5d3fa1d06a04c1a9
-
SHA512
0a701194d7d3a22d73f0a5e1f5a13e0451bf1214e761d16d144e5f6c009e06cb96d96ec7ce0b8296f5d0f7de73ca82258a73a6b1994c33ca8d70930d5d7d1de1
-
SSDEEP
768:JMbcNSVFUXDOeNIHJNWFg9AwCd7D67DMTDPVh3:1XCeN+AmTDMfPVh3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acppage.dll
Files
-
acppage.dll.dll windows:6 windows x86 arch:x86
e16efc45a8d06b6013b239096c28764e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
sscanf_s
memcmp
_except_handler4_common
_onexit
__dllonexit
_unlock
_lock
_initterm
_amsg_exit
_XcptFilter
malloc
free
memset
wcscat_s
_wcsupr
_vsnwprintf
wcsstr
_wcsnicmp
_wcsicmp
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
ntdll
RtlImageDirectoryEntryToData
RtlImageRvaToVa
NtCreateSection
RtlNtStatusToDosError
NtQuerySection
RtlAllocateHeap
RtlFreeHeap
NtQueryInformationToken
NtOpenProcessToken
NtClose
NtOpenThreadToken
RtlInitUnicodeString
kernel32
LoadLibraryExW
GetModuleFileNameW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
GetModuleHandleW
CreateFileMappingW
SystemTimeToFileTime
GetFileTime
FileTimeToSystemTime
QueryActCtxW
GetVersionExW
MapViewOfFile
UnmapViewOfFile
ReleaseActCtx
GetLocalTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
RaiseException
EnterCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
GetLastError
lstrcmpiA
EncodePointer
CreateProcessW
HeapAlloc
HeapFree
GetProcessHeap
GetSystemDirectoryW
RegQueryValueExW
LoadLibraryW
CheckElevationEnabled
CreateFileW
GetProcAddress
DecodePointer
RegOpenKeyExW
BasepGetExeArchType
CloseHandle
RegCloseKey
LocalFree
ExpandEnvironmentStringsW
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
user32
GetParent
IsWindowEnabled
GetWindowLongW
GetDlgItem
SetWindowLongW
SendDlgItemMessageW
GetSystemMetrics
SendMessageW
EnableWindow
LoadStringA
LoadStringW
InsertMenuW
shlwapi
PathFindFileNameW
PathFindExtensionW
ord176
StrCmpIW
shell32
SHParseDisplayName
ord155
SHGetPathFromIDListW
SHGetItemFromDataObject
SHChangeNotify
SHGetNameFromIDList
ole32
CoInitializeEx
CoGetObject
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoCreateInstance
HWND_UserSize
HWND_UserFree
ObjectStublessClient3
HWND_UserUnmarshal
HWND_UserMarshal
rpcrt4
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Disconnect
CStdStubBuffer_DebugServerRelease
NdrDllGetClassObject
IUnknown_AddRef_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_Invoke
NdrDllCanUnloadNow
CStdStubBuffer_CountRefs
NdrCStdStubBuffer_Release
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
CStdStubBuffer_AddRef
IUnknown_Release_Proxy
CStdStubBuffer_Connect
sfc
SfcIsFileProtected
msi
ord201
ord173
apphelp
SdbReleaseDatabase
SdbInitDatabase
SdbGetMatchingExe
SdbGetAppPatchDir
SdbQueryFlagMask
ApphelpDebugPrintf
Exports
Exports
DllCanUnloadNow
DllGetClassObject
GetExeFromLnk
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 163B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ