dxtmsft.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dxtmsft.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dxtmsft.dll
Resource
win10v2004-20240426-en
General
-
Target
dxtmsft.dll
-
Size
479KB
-
MD5
ca8dcf5822efdbaaf26b39c5f3bb4cb2
-
SHA1
9d7cf4157b97c29242d63e78af21f468c4ee5213
-
SHA256
ef7a81cb26e5b9ae4a59da35730c4e0b9c384bf2c69aa002b5b950c15dc05798
-
SHA512
4eb41897b4e5a59c42fcf32f816582702e6fda4e58ec3fec781c4674816b54200e815f754b779f5c2cacc0901109525af071cdf49d0fffe1cf18251358c53a19
-
SSDEEP
6144:dkklqjbxBy5s8nS89x/V2X6r4jpXIJMnIgIVS4sS92Okb+kIt3DtXWtR4irn2eBU:3l4qxP8jpAVSmgOAE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dxtmsft.dll
Files
-
dxtmsft.dll.dll regsvr32 windows:6 windows x64 arch:x64
df243ab4b4cd99501c1b90f0c277c580
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
memset
powf
sin
sinf
sqrt
_purecall
memcpy
__C_specific_handler
_initterm
_amsg_exit
_XcptFilter
malloc
memcmp
cos
__CxxFrameHandler3
free
memcpy_s
_resetstkoflw
_wcsicmp
_vsnwprintf
srand
time
rand
sqrtf
atl
ord16
ord21
ord15
ord23
ord30
ord32
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
HeapFree
DisableThreadLibraryCalls
HeapAlloc
HeapSetInformation
GetProcessHeap
CloseHandle
GetCurrentThreadId
VirtualProtect
GetSystemInfo
CreateEventW
VirtualAlloc
GetVersionExW
WideCharToMultiByte
GetCurrentProcess
VirtualQuery
DeleteCriticalSection
EnterCriticalSection
IsBadWritePtr
LeaveCriticalSection
IsBadCodePtr
InitializeCriticalSection
IsBadReadPtr
TerminateProcess
user32
GetSysColor
CopyRect
OffsetRect
IntersectRect
ole32
CoCreateFreeThreadedMarshaler
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
SysStringLen
VariantCopy
SysAllocStringLen
VariantChangeType
SetErrorInfo
LoadRegTypeLi
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
gdi32
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
SetICMMode
CreateColorSpaceW
SetColorSpace
SetDIBitsToDevice
DeleteObject
DeleteColorSpace
dxtrans
?DXOverArray@@YAXPEAVDXPMSAMPLE@@PEBV1@K@Z
?DXDitherArray@@YAXPEBUDXDITHERDESC@@@Z
?DXOverArrayMMX@@YAXPEAVDXPMSAMPLE@@PEBV1@K@Z
shlwapi
UrlCombineW
Exports
Exports
DllCanUnloadNow
DllEnumClassObjects
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ