D:\builds\build-sourcemod-msvc12\windows-1.12\OUTPUT\extensions\sdktools\sdktools.ext.2.insurgency\windows-x86\sdktools.ext.2.insurgency.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8.dll
Resource
win10v2004-20240226-en
General
-
Target
18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8
-
Size
919KB
-
MD5
c529c4f9ce9e746706603f53c7d24e7c
-
SHA1
10cb9aaeed4b102fda8195b2128adc3e712059ac
-
SHA256
18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8
-
SHA512
d004dab9f3e77033433bec24cd0856f361287eda47e70e70eee34de2dda55dad8d4f7e6109e9787d8ff1c4867bbd297e476c2c76d06d3fc0c2aa6614b08f5f7b
-
SSDEEP
12288:gkFqTbTnmyCnirVZ7iUdagfhJl6JPBC5OuO7kkvhawdQZda4fPcVaI:LcTbTnmyCnkVZ7iUTPl2BOOujGMXRPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8
Files
-
18be7c67a78cf047fc3d7806c7be3e1954b86066e64814310f78a3fbf26dcff8.dll windows:5 windows x86 arch:x86
87bf9c329e3e82adb6c711fae4ebbf64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualQuery
RtlPcToFileHeader
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
IsBadReadPtr
IsBadWritePtr
WriteConsoleW
SetEndOfFile
MultiByteToWideChar
WideCharToMultiByte
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
WaitForSingleObjectEx
SwitchToThread
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetEnvironmentVariableW
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
HeapFree
HeapAlloc
GetStdHandle
GetFileType
GetTimeZoneInformation
HeapReAlloc
DecodePointer
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStringTypeW
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
CreateFileW
HeapSize
ReadFile
ReadConsoleW
tier0
GetCPUInformation
g_pMemAlloc
_AssertValidStringPtr
_AssertValidWritePtr
_AssertValidReadPtr
Exports
Exports
CreateInterface_MMS
GetSMExtAPI
Sections
.text Size: 341KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 516KB - Virtual size: 515KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ