D:\Work\Envoy\DrvIn\Curr3\Bin\ev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e.dll
Resource
win10v2004-20240508-en
General
-
Target
78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e
-
Size
366KB
-
MD5
6d6f3a06f9480314a6e64748955a4c14
-
SHA1
1a9b6351544174afe64791b5eb3062e762949503
-
SHA256
78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e
-
SHA512
cb38dab651f8f6fbac506f079ab73f416ae4513eb459ca78b899af08f7ed687c22035db7eebb32336c6cc4607b50c3f714e853dc14a5e61e1c95417393aa0803
-
SSDEEP
6144:qtjXiziP05sBI6aiqUAxCqyONUH7NDi6KJET:qJXizq0m1GPxjwN5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e
Files
-
78492cf5e00316503e77cdcb9dfa258d56ed05c0b06b7879c4908cfca5ae467e.dll windows:5 windows x86 arch:x86
f2a0be313498ca7f171034b5f4ee3d4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
QueryPerformanceCounter
InitializeCriticalSection
CreateEventW
CreateThread
EnterCriticalSection
SetEvent
LeaveCriticalSection
Sleep
CloseHandle
DeleteCriticalSection
WaitForSingleObject
CreateFileW
WriteFile
FindFirstFileW
FindClose
FindNextFileW
DeleteFileW
RemoveDirectoryW
GetLastError
GetNativeSystemInfo
GetTempPathW
WideCharToMultiByte
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
EncodePointer
DecodePointer
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
GetProcAddress
HeapFree
HeapAlloc
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetModuleFileNameW
LCMapStringW
GetStringTypeW
RtlUnwind
FlushFileBuffers
user32
GetKeyState
SendInput
GetSystemMetrics
shell32
SHCreateDirectoryExW
ShellExecuteExW
Exports
Exports
AlvaHolt
AndreArchibald
ArnoGus
BurtonWhit
ChloeRoger
ClarenceDorothea
CoralGeoffrey
DeborahNell
DrewWashington
ElmerGodwin
ElvaJackson
GeoffreySawyer
HarleyCarrie
HarryConnor
IngemarWells
JillHansom
LaurenBush
LetitiaPullan
MichaeliaToby
OctaviaGreen
PatriciaWinifred
SherryJuliana
SpencerBen
ThomasBecher
UnaWalton
VeraBrowne
c
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ