msado15.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6696602f09ecfdfdc109c49ec46ac0c4d313836f6629d172c1517383a081b5f1.dll
Resource
win10v2004-20240508-en
General
-
Target
6696602f09ecfdfdc109c49ec46ac0c4d313836f6629d172c1517383a081b5f1
-
Size
1.1MB
-
MD5
f9cba2a72745185262c904e8c807ac3d
-
SHA1
95e1ba3ca8e9067d1d1fad362a07beec642c0e25
-
SHA256
6696602f09ecfdfdc109c49ec46ac0c4d313836f6629d172c1517383a081b5f1
-
SHA512
3f9598881c8d9ae4f4ad565d6f29f57c6ecb4877d426e654fe588b4bd6d127bdc14df5369eab9fd0b9b11971d6ea33a309d633c82883de82221b0d64d179ca82
-
SSDEEP
12288:RHxyPxO+PPubl/l+gpE8UeJUbqOADsjdA5CSsUXCBC5CRy8vZtdnc2OQ7orhj3BG:Z4Egkl/hxwZidN67qr7NWji0rEH7g3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6696602f09ecfdfdc109c49ec46ac0c4d313836f6629d172c1517383a081b5f1
Files
-
6696602f09ecfdfdc109c49ec46ac0c4d313836f6629d172c1517383a081b5f1.dll regsvr32 windows:10 windows x86 arch:x86
87a9df22ec05242562ef07f5a661d581
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_vsnprintf_s
memmove_s
iswalpha
iswalnum
iswspace
_wmakepath_s
wcsstr
strncpy_s
realloc
_stricmp
_ultoa_s
wcsncmp
memcpy_s
_vsnwprintf
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
malloc
free
_wcsnicmp
wcschr
_purecall
_wcsicmp
memcpy
memcmp
_ftol2_sse
_ftol2
_CxxThrowException
_wtol
_ultow_s
_wfopen
_get_osfhandle
_fileno
_waccess
_wrename
fclose
fread
fwrite
fseek
_XcptFilter
_amsg_exit
_initterm
?terminate@@YAXXZ
_except_handler4_common
??1type_info@@UAE@XZ
_lock
__CxxFrameHandler3
_unlock
__dllonexit
_onexit
memmove
_wsplitpath_s
memset
msdart
FXMemDetach
MpGetHeapHandle
FXMemAttach
MpHeapReAlloc
MPInitializeCriticalSection
UMSEnterCSWraper
MPDeleteCriticalSection
?ReadUnlock@CReaderWriterLock3AR@@QAEXXZ
?ReadLock@CReaderWriterLock3AR@@QAEXXZ
?ReadOrWriteUnlock@CReaderWriterLock3AR@@QAEX_N@Z
?ReadOrWriteLock@CReaderWriterLock3AR@@QAE_NXZ
?WriteUnlock@CReaderWriterLock3AR@@QAEXXZ
?WriteLock@CReaderWriterLock3AR@@QAEXXZ
??1CReaderWriterLock3AR@@QAE@XZ
??0CReaderWriterLock3AR@@QAE@XZ
MpHeapAlloc
MpHeapFree
kernel32
CreateFileW
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
DeleteFileW
CompareStringW
GetWindowsDirectoryW
LCMapStringW
TlsFree
TlsAlloc
GetModuleFileNameW
LoadLibraryExW
FreeLibrary
HeapDestroy
SearchPathA
GetSystemDirectoryA
DisableThreadLibraryCalls
GetFullPathNameA
InitializeCriticalSection
LoadLibraryExA
GetDriveTypeA
OutputDebugStringA
GetFileTime
ReadFile
WriteFile
GetFileType
GetTempFileNameW
GetFullPathNameW
Sleep
CreateSemaphoreExW
CreateMutexExW
GetCurrentProcessId
WideCharToMultiByte
MultiByteToWideChar
CreateThreadpoolTimer
OpenSemaphoreW
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSectionEx
EnterCriticalSection
WaitForSingleObjectEx
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
ReleaseMutex
ReleaseSemaphore
SetLastError
ReleaseSRWLockShared
AcquireSRWLockShared
TlsSetValue
TlsGetValue
CloseHandle
CreateThread
GetCurrentThreadId
GetUserDefaultLCID
VirtualProtect
VirtualAlloc
VirtualQuery
GetSystemInfo
LeaveCriticalSection
FormatMessageW
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleExW
GetModuleFileNameA
DebugBreak
GetModuleHandleW
GetProcAddress
GetLastError
IsDebuggerPresent
OutputDebugStringW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
user32
UnregisterClassW
DefWindowProcW
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongW
GetWindow
GetDesktopWindow
MessageBoxW
MsgWaitForMultipleObjects
LoadStringW
DispatchMessageW
GetActiveWindow
PostMessageW
PeekMessageW
CreateWindowExW
RegisterClassExW
TranslateMessage
DestroyWindow
advapi32
RegisterTraceGuidsW
RegQueryValueExW
SetFileSecurityW
GetFileSecurityW
RegGetValueA
RegQueryValueExA
RegCloseKey
UnregisterTraceGuids
RegOpenKeyExA
RegOpenKeyExW
ole32
CreateFileMoniker
CreateBindCtx
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
CoCreateFreeThreadedMarshaler
CoTaskMemAlloc
oleaut32
VariantCopy
SafeArrayUnlock
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
GetErrorInfo
VariantClear
VariantChangeType
LoadRegTypeLi
VariantInit
SetErrorInfo
SafeArrayRedim
SafeArrayDestroy
SysStringByteLen
SafeArrayPutElement
SafeArrayGetElement
CreateErrorInfo
LoadTypeLi
OaBuildVersion
SysReAllocStringLen
SafeArrayCopy
SafeArrayCreate
SafeArrayLock
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RNIGetCompatibleVersion
com_ms_wfc_data_Field_getBoolean
com_ms_wfc_data_Field_getByte
com_ms_wfc_data_Field_getBytes
com_ms_wfc_data_Field_getDataTimestamp
com_ms_wfc_data_Field_getDouble
com_ms_wfc_data_Field_getFloat
com_ms_wfc_data_Field_getInt
com_ms_wfc_data_Field_getLong
com_ms_wfc_data_Field_getShort
com_ms_wfc_data_Field_getString
com_ms_wfc_data_Field_isNull
com_ms_wfc_data_Field_loadMsjava
com_ms_wfc_data_Field_setDataDate
Sections
.text Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdbid Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ