C:\Users\log\AppData\Local\Temp\clas1.6.3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7.dll
Resource
win10v2004-20240508-en
General
-
Target
fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7
-
Size
7.9MB
-
MD5
80f5ae539f7177222300ef70862b73ae
-
SHA1
9a8449610c1ba5f3b34379af298d170bbf6b45d0
-
SHA256
fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7
-
SHA512
ae1360665c54707fd705efb94a3677e71ef96504ba9cfd99b764fb664ac2af1c1e785a577d9ad1244532505926c373fbb770b6141967006c07980c8875586e82
-
SSDEEP
98304:ZWV9Trq8E/U7mwQxxFkoEioH0FY3NkeD:ZWVB0/im/xpEioUy3Nke
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7
Files
-
fda8a6f0beb00881eb19b957fda50dfe33b0567ad12290dd4ab8389d10ec74e7.dll windows:6 windows x86 arch:x86
1ea517d9fe2a6cd49aeb8b3dddce8af7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InitOnceComplete
InitOnceBeginInitialize
ReadConsoleA
SetConsoleMode
SwitchToThread
ConvertThreadToFiberEx
ConvertFiberToThread
CreateFiberEx
DeleteFiber
SwitchToFiber
GetEnvironmentVariableW
HeapReAlloc
HeapFree
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
IsBadCodePtr
LocalSize
FindFirstFileW
HeapAlloc
FindResourceA
SizeofResource
LockResource
LoadResource
FreeResource
CloseHandle
GetTempPathA
WriteFile
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
SetNamedPipeHandleState
SetEvent
ReleaseMutex
OpenEventA
GetCurrentProcessId
GetCurrentThreadId
MapViewOfFile
UnmapViewOfFile
OpenMutexA
OpenFileMappingA
WaitNamedPipeA
GetConsoleCP
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetLocaleInfoA
CreateEventA
LoadLibraryExA
FormatMessageA
Sleep
GetFileAttributesA
GetFullPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetStdHandle
FlushFileBuffers
GetFileAttributesExA
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
GetCurrentProcess
SetLastError
DisconnectNamedPipe
PeekNamedPipe
GetOverlappedResult
CancelIo
WaitForMultipleObjects
GetLogicalDrives
GetTickCount
CreateFileMappingW
GetSystemTime
SystemTimeToFileTime
GetFileSize
LockFileEx
LocalFree
UnlockFile
HeapDestroy
HeapCompact
LoadLibraryW
GetSystemInfo
DeleteFileW
DeleteFileA
WaitForSingleObjectEx
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetDiskFreeSpaceA
FormatMessageW
HeapSize
HeapValidate
GetFileAttributesW
CreateFileW
CreateMutexW
GetTempPathW
UnlockFileEx
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
TryEnterCriticalSection
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
InitializeSRWLock
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
FlsAlloc
FlsSetValue
FlsFree
InitializeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
GetCurrentProcessorNumber
GetModuleHandleW
GetStringTypeW
GetCPInfo
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
CreateThread
GetEnvironmentVariableA
GetCurrentDirectoryA
CreateDirectoryA
RemoveDirectoryA
MoveFileA
PostQueuedCompletionStatus
CreateIoCompletionPort
GetQueuedCompletionStatus
GetQueuedCompletionStatusEx
GetCurrentThread
SetFileCompletionNotificationModes
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
GetThreadId
GetVersionExA
ReadProcessMemory
LoadLibraryExW
GetLargePageMinimum
VirtualUnlock
GetNumaHighestNodeNumber
GetNumaProcessorNode
GetNumaNodeProcessorMask
GetProcessTimes
K32GetProcessMemoryInfo
CreateMutexA
InitializeCriticalSectionAndSpinCount
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
SetConsoleCtrlHandler
GetTimeZoneInformation
SetStdHandle
GetFileType
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitThread
FreeLibraryAndExitThread
FindClose
FindFirstFileExW
FindNextFileW
GetModuleFileNameW
SetEnvironmentVariableW
GetCurrentDirectoryW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
GetExitCodeProcess
CreateProcessW
CreateFileA
ws2_32
closesocket
WSCEnumProtocols
WSAPoll
WSAWaitForMultipleEvents
WSASocketW
gethostbyname
inet_addr
inet_ntoa
gethostbyaddr
getservbyport
WSASocketA
WSARecv
WSAEventSelect
WSAConnect
WSAAccept
WSAAsyncSelect
recvfrom
accept
getnameinfo
WSAIoctl
WSASetLastError
shutdown
setsockopt
send
select
recv
htonl
getsockopt
getpeername
ioctlsocket
connect
__WSAFDIsSet
freeaddrinfo
WSASendTo
WSARecvFrom
WSASend
getaddrinfo
WSAGetLastError
getsockname
bind
getservbyname
ntohs
inet_pton
WSACleanup
WSAStartup
socket
sendto
htons
secur32
InitializeSecurityContextW
DeleteSecurityContext
FreeCredentialsHandle
FreeContextBuffer
AcquireCredentialsHandleA
CompleteAuthToken
bcrypt
BCryptGenRandom
user32
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
GetDesktopWindow
advapi32
ReportEventW
RegEnumValueA
RegOpenKeyExA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
RegisterEventSourceW
CryptExportKey
CryptDecrypt
CryptCreateHash
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
odbc32
ord72
ord4
ord61
ord76
ord20
ord19
ord18
ord35
ord13
ord12
ord8
ord26
ord236
ord41
ord54
ord75
ord39
ord45
ord31
ord24
ord9
ord29
ord11
crypt32
CertGetCertificateContextProperty
CertFreeCertificateContext
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
Exports
Exports
GetCat
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 419KB - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ