c:\Devlp01\EvidenceEraser\trunk\release\PrivacyShell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0.dll
Resource
win10v2004-20240226-en
General
-
Target
1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0
-
Size
1.2MB
-
MD5
d9228d2f1fd1593c5bca84175eae4cde
-
SHA1
c55fa6b1595c295e8f6f0efb760c19154e6dbca1
-
SHA256
1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0
-
SHA512
6b397cbc2a1ef5a73123316d733b8b21186508e0b8b307c147c3e5b5709c12bfb3a4bbed5e1d8d68118ad2bab51a9b231fcd3607f0a078a1039e0b2268e024a6
-
SSDEEP
12288:wUo3t8C3szFs+59ivJX5F49bHEaIJR90lKFvyDiqTOc1EMwV:fo3vXXIN+R98Cyi+OsM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0
Files
-
1e63365e306d9dcfe73b8c4809e74ddbbae45acea3b07e10c2e744b23249a8f0.dll regsvr32 windows:4 windows x86 arch:x86
3291c2f738928f1bbb7ae5b3b5b387a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FormatMessageA
ExpandEnvironmentStringsA
HeapReAlloc
CreateThread
SetLastError
MulDiv
GlobalAlloc
GlobalFree
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
GetModuleFileNameW
ResumeThread
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
LockFile
UnlockFile
GetVolumeInformationA
GetFullPathNameA
FileTimeToLocalFileTime
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetCurrentDirectoryA
GlobalFlags
LocalFree
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualQuery
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
ExitProcess
GetTimeFormatA
GetDateFormatA
ExitThread
SetStdHandle
GetFileType
SetCurrentDirectoryA
SetEnvironmentVariableA
HeapSize
HeapDestroy
HeapCreate
GetACP
IsValidCodePage
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ReadFile
FileTimeToSystemTime
GetFileTime
GetSystemInfo
GetLocalTime
Sleep
GetStdHandle
FreeResource
WinExec
lstrcatA
lstrcpyA
SetEndOfFile
GetTempFileNameA
SetFilePointer
WriteFile
FlushFileBuffers
TerminateThread
QueryDosDeviceA
VirtualAlloc
VirtualFree
DuplicateHandle
GetVersionExA
RemoveDirectoryA
Process32First
TerminateProcess
Process32Next
GetCurrentProcessId
CreateToolhelp32Snapshot
Module32First
Module32Next
CreateDirectoryA
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapFree
GetWindowsDirectoryA
GetTempPathA
GetLogicalDrives
GetDriveTypeA
FindFirstFileA
GetFileAttributesA
GetFileSize
GetBinaryTypeA
FindNextFileA
FindClose
CreateFileA
SetFileAttributesA
WritePrivateProfileStringA
DeleteFileA
MoveFileA
OpenProcess
CreateRemoteThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
GlobalLock
GlobalUnlock
lstrcpynW
lstrcpynA
GetThreadLocale
SetThreadLocale
LoadLibraryExA
FreeLibrary
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
LoadLibraryA
lstrcmpiA
lstrlenA
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
user32
UnregisterClassA
GetSysColorBrush
DestroyMenu
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
WindowFromPoint
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
TrackMouseEvent
SetForegroundWindow
SetWindowRgn
CopyRect
ReleaseDC
InvalidateRect
ReleaseCapture
PtInRect
GetDC
GetClientRect
GetParent
SendMessageA
GetWindowRect
IsWindow
GetSysColor
LoadCursorA
SetCursor
GetWindowThreadProcessId
GetWindowTextA
ExitWindowsEx
EnableWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RedrawWindow
CharUpperA
InsertMenuA
SetMenuItemBitmaps
PostMessageA
CharNextA
LoadBitmapA
DrawFocusRect
DrawEdge
SetClassLongA
DestroyCursor
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
BeginPaint
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetDlgCtrlID
EndPaint
gdi32
GetStockObject
CreateRectRgn
DeleteObject
CombineRgn
CreateCompatibleDC
CreatePatternBrush
CreateCompatibleBitmap
GetPixel
BitBlt
CreateSolidBrush
ExtCreateRegion
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetTextColor
SetMapMode
GetClipBox
SelectClipRgn
PtVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetTextMetricsA
RectVisible
StretchBlt
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
SHDeleteKeyA
PathIsDirectoryA
UrlUnescapeA
ole32
CoCreateInstance
ReleaseStgMedium
CoInitializeEx
CoUninitialize
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
VariantClear
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 440KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 592KB - Virtual size: 591KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ