C:\Users\Administrator\Desktop\2023-10-10\dll\x64\Release\demo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c.dll
Resource
win10v2004-20240508-en
General
-
Target
df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c
-
Size
329KB
-
MD5
fa47936cc4a157f4844a82ef4ea5c61d
-
SHA1
1baf0f3a36900397f5a1cf5adba806a28324c651
-
SHA256
df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c
-
SHA512
0745f25b0bcdf69ff3f1840c9c779825600b51621ff268b9d932d80aee7b1b503f94980a50940c9f715a60f6beed1d396c89634e45fe08723a2dc35ceee5426e
-
SSDEEP
6144:FbDtuhaqvzCSub6jlWW55kkA3vaEXP6iaLQgc82yv5t:1cawhukgkA3vBg5v5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c
Files
-
df75b0b8ea1f75f0039c158c89e413ed6c4352309cc2cfa282afd1857676a88c.dll windows:5 windows x64 arch:x64
5411c8f46763b5df4641ab07e2158d47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LocalFree
FormatMessageA
GlobalUnlock
GlobalFree
SetLastError
GetLastError
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
CreateFileA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
WaitForSingleObject
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
TlsAlloc
GlobalReAlloc
GlobalHandle
TlsSetValue
LocalReAlloc
GlobalAddAtomA
GetCurrentProcessId
GetVersionExA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleHandleW
GetCPInfo
GetOEMCP
HeapAlloc
ExitProcess
HeapFree
GetSystemTimeAsFileTime
FlsSetValue
RtlLookupFunctionEntry
RtlUnwindEx
HeapReAlloc
RaiseException
RtlPcToFileHeader
HeapQueryInformation
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
GetACP
IsValidCodePage
GetStdHandle
HeapSetInformation
HeapCreate
HeapDestroy
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrlenA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetProcAddress
DebugBreak
OutputDebugStringA
Sleep
CloseHandle
GetStartupInfoA
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetModuleHandleA
DeleteCriticalSection
GetCommandLineA
user32
MapWindowPoints
GetMessagePos
GetMessageTime
SetWindowLongPtrA
GetWindowLongPtrA
DestroyWindow
GetTopWindow
GetDlgItem
GetForegroundWindow
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassLongPtrA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
GetSysColorBrush
LoadCursorA
ShowWindow
DestroyMenu
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
MessageBoxA
CharLowerA
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
GetSysColor
shlwapi
PathFindExtensionA
ws2_32
WSAStartup
socket
ioctlsocket
gethostbyname
ntohs
connect
select
getsockopt
WSACleanup
closesocket
recv
send
setsockopt
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
GetStockObject
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
DeleteDC
DeleteObject
PtVisible
RectVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetDeviceCaps
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
??4Cdemo@@QEAAAEAV0@AEBV0@@Z
RegisterModule
Sections
.text Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ