DeviceMetadataRetrievalClient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
DeviceMetadataRetrievalClient.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DeviceMetadataRetrievalClient.dll
Resource
win10v2004-20240508-en
General
-
Target
DeviceMetadataRetrievalClient.dll
-
Size
132KB
-
MD5
496d0c2a5a1b57b010aa1714fc730b8d
-
SHA1
17f6bf299836bcfa7af7b661470eabad40db2582
-
SHA256
1605a3631c9a02026baae2630e11b81b5da129e2d8cb4b92fc85f7ebe88ffd7d
-
SHA512
612b9bb45ece34d02e6f33b6ee30942810026457ba436ab3dca54ac1d9ecfe67f3ee2ce25760c55265d28540f5dfad6f71c84d66a9c99ad9d2bd7e397cacbb9e
-
SSDEEP
3072:tpMorOZYbTLyotLzEHpDJbNCRf7hWbQNZU0zrEvxa:6qTeodzT7hiQNiSYvx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DeviceMetadataRetrievalClient.dll
Files
-
DeviceMetadataRetrievalClient.dll.dll windows:6 windows x64 arch:x64
08b20a61d9cc56d3acbcf2b0dcbc9501
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscpy_s
memset
__C_specific_handler
_XcptFilter
_amsg_exit
_initterm
_lock
_unlock
__dllonexit
wcsncpy_s
malloc
calloc
wcsncmp
memcpy_s
_wcslwr_s
free
_vsnwprintf
_onexit
__CxxFrameHandler3
memcpy
swscanf
_ultow_s
time
iswalpha
towlower
_wcsnicmp
??_U@YAPEAX_K@Z
??2@YAPEAX_K@Z
_purecall
wcsrchr
_wtoi
memmove_s
wcsnlen
_wcsicmp
??_V@YAXPEAX@Z
??3@YAXPEAX@Z
wcscmp
ntdll
WinSqmStartSession
WinSqmSetString
WinSqmSetDWORD
WinSqmEndSession
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
user32
UnregisterClassA
CharPrevW
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
lstrcmpW
SetFileAttributesW
DeleteFileW
GetTempFileNameW
MoveFileExW
FindNextFileW
FindClose
CreateFileW
CloseHandle
RemoveDirectoryW
GetTempPathW
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetLastError
CompareFileTime
LocalFree
HeapReAlloc
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsW
RaiseException
InitializeCriticalSection
GetFileAttributesExW
GetFileSizeEx
SetFilePointerEx
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
SizeofResource
LockResource
LoadResource
FindResourceExW
WaitForSingleObject
GlobalFree
CreateEventW
WaitForMultipleObjects
ResetEvent
SetEvent
CreateFileA
SetFilePointer
GetShortPathNameW
MoveFileW
GetVersionExW
GetUserGeoID
GetGeoInfoW
IsValidLocaleName
FindFirstChangeNotificationW
RegisterWaitForSingleObject
UnregisterWaitEx
FindCloseChangeNotification
SleepEx
FindNextChangeNotification
CreateThreadpool
SetThreadpoolThreadMaximum
SetThreadpoolThreadMinimum
CreateThreadpoolCleanupGroup
CloseThreadpoolCleanupGroupMembers
CloseThreadpoolCleanupGroup
CloseThreadpool
CreateThreadpoolWork
SubmitThreadpoolWork
CallbackMayRunLong
lstrcmpiW
ReleaseMutex
ClosePrivateNamespace
OpenPrivateNamespaceW
OpenMutexW
DeleteBoundaryDescriptor
CreateBoundaryDescriptorW
GetFullPathNameW
CreateMutexW
CreatePrivateNamespaceW
GetCurrentThread
GlobalAlloc
HeapDestroy
HeapSize
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
HeapFree
SetLastError
GetProcessHeap
HeapAlloc
InitializeCriticalSectionAndSpinCount
AddSIDToBoundaryDescriptor
advapi32
GetTraceLoggerHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegGetValueW
RegSetValueExW
TraceMessage
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
EventRegister
EventUnregister
EventWrite
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetNamedSecurityInfoW
CreateWellKnownSid
CopySid
IsValidSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAceEx
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
ConvertSidToStringSidW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
SetNamedSecurityInfoW
GetSecurityDescriptorDacl
EqualSid
GetAce
GetTraceEnableLevel
winhttp
WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetStatusCallback
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpOpen
WinHttpCloseHandle
shlwapi
UrlCanonicalizeW
SHStrDupW
ord12
propsys
InitPropVariantFromStringVector
ole32
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
StringFromIID
PropVariantClear
rpcrt4
UuidFromStringW
UuidToStringW
RpcStringFreeW
cabinet
ord22
ord20
ord23
xmllite
CreateXmlWriterOutputWithEncodingName
CreateXmlWriter
CreateXmlReader
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
crypt32
CertVerifyCertificateChainPolicy
wer
WerReportCloseHandle
WerReportSubmit
WerReportAddFile
WerReportSetParameter
WerReportCreate
devrtl
NdxTableFirstObjectInList
NdxTableSetTypeDefinition
NdxTableOpen
NdxTableRemoveObjectFromList
NdxTableAddObjectToList
NdxTableRemoveObject
NdxTableSetPropertyValue
NdxTableGetObjectName
NdxTableGetObjectType
NdxTableGetPropertyValue
NdxTableFirstObject
NdxTableNextObject
NdxTableObjectFromName
NdxTableClose
NdxTableAddObject
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ