D:\work\zprogg\Release\zprog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd.dll
Resource
win10v2004-20240226-en
General
-
Target
e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd.dll
-
Size
3.3MB
-
MD5
ec203098f0e1d9ab5db48e0b73ced3f7
-
SHA1
80588a32e25db376f6f8132826e147c89185981c
-
SHA256
e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd
-
SHA512
cdd2ab19c6c8e762502a6dcae5bea0d2c039bf9ec86fa9caf0cb8cda5049e9347d6eae99171d32096781e78c260f5295b87abc0ac527126258a04237a190fc12
-
SSDEEP
98304:sKwKFd1dlcfQ8JJUomw7GQu8R9lhpN7X3eHv:p1aJUeBtH7X6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd.dll
Files
-
e56af0fe01834fd6c75200ddd87d4f6ef7e1d32a97d6f329bf2dbd25410c65dd.dll.dll windows:5 windows x86 arch:x86
55a536f6bd95eec81865cd52a8091052
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Process32Next
CloseHandle
WritePrivateProfileStringA
GetProcAddress
LocalFree
RemoveDirectoryA
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
CreateDirectoryA
DeleteFileA
VirtualQuery
Sleep
SizeofResource
WriteFile
FindResourceA
GetEnvironmentVariableA
CopyFileA
CreateFileA
LockResource
GetSystemInfo
LoadResource
MoveFileExA
OutputDebugStringW
GetFileAttributesA
GetLastError
MultiByteToWideChar
CreateToolhelp32Snapshot
GetCommandLineA
OpenProcess
GetModuleHandleA
GetFileAttributesW
WaitForSingleObject
CreateMutexA
FindClose
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
FindNextFileA
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
FindFirstFileA
Process32First
GetModuleFileNameA
HeapSize
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableA
SetEndOfFile
FreeEnvironmentStringsW
EncodePointer
DecodePointer
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
ReadFile
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetStdHandle
GetACP
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
DeleteFileW
GetProcessHeap
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
advapi32
CloseServiceHandle
OpenSCManagerW
BuildExplicitAccessWithNameA
SetEntriesInAclA
RegCloseKey
SetNamedSecurityInfoA
RegDeleteKeyW
GetNamedSecurityInfoA
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CreateServiceW
shell32
CommandLineToArgvW
shlwapi
PathRemoveFileSpecA
PathFileExistsA
Exports
Exports
fnzprog
fnzproglocal
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ