C:\Users\josie\OneDrive\Área de Trabalho\WYD Aelion\Client Local\ClientPatch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941.dll
Resource
win10v2004-20240426-en
General
-
Target
17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941
-
Size
1.5MB
-
MD5
ad67ed7b852fe07b8c27817de816e82d
-
SHA1
c854a3c04be1750f8cfca0f4f5970d429cbbfb92
-
SHA256
17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941
-
SHA512
0a6096f9205d95423949b21d225d3e0173a62f1af8520bd35813f2598d61a1a2b75aa76dcf291b911162c6c8e907f47879f20b8244bc9d21cc07f0cd01f80f1a
-
SSDEEP
24576:zrk1xsUP+3kKBAez9sI0hL52QW/SNez9sI0hL52QW/SZBY:bUP+FBPBsI0h1XsBsI0h1XZB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941
Files
-
17baafb3f9304881709f2199ad16940dae389b675582f66f37909aae279aa941.dll windows:6 windows x86 arch:x86
d670624926d0aa1c5a388ad6c49fb369
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateToolhelp32Snapshot
DisableThreadLibraryCalls
GetCurrentThread
Process32Next
CloseHandle
SetProcessWorkingSetSize
GetTickCount
RemoveDirectoryA
GetModuleFileNameW
lstrlenW
MultiByteToWideChar
CreateFileW
ReadFile
WriteFile
GetLastError
PeekNamedPipe
WaitNamedPipeW
GetCurrentProcessId
WriteConsoleW
SetEndOfFile
HeapSize
SetStdHandle
GetProcessHeap
OpenProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetFileAttributesExW
CreateProcessW
WaitForSingleObject
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
SetThreadPriority
TerminateProcess
Process32First
SetThreadAffinityMask
FlushInstructionCache
FreeLibrary
GetExitCodeProcess
ReadProcessMemory
ExitProcess
GetProcAddress
LoadLibraryA
CreateThread
Sleep
GetModuleHandleA
GetCurrentProcess
VirtualProtect
SetEnvironmentVariableW
HeapFree
GetConsoleMode
WideCharToMultiByte
QueryPerformanceCounter
WaitForSingleObjectEx
GetCurrentThreadId
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
ExitThread
FreeLibraryAndExitThread
GetFileSizeEx
SetFilePointerEx
GetStdHandle
GetFileType
HeapAlloc
FlushFileBuffers
GetConsoleOutputCP
user32
LoadImageA
LoadCursorA
DestroyWindow
GetSystemMetrics
SetWindowLongA
GetWindowLongA
DefWindowProcA
CreateWindowExA
GetClientRect
ShowWindow
RegisterClassExA
UnregisterClassA
BeginPaint
EndPaint
BlockInput
FindWindowExA
MessageBoxA
SendMessageA
FindWindowA
UpdateWindow
gdi32
BitBlt
CreateFontA
SelectObject
CreateCompatibleDC
GetStockObject
DeleteDC
SetTextColor
TextOutA
SetBkMode
DeleteObject
GetObjectA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
rpcrt4
UuidCreateSequential
Exports
Exports
EntryProc
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ