C:\dev_code\DumpModule\Release\DumpClient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b.dll
Resource
win10v2004-20240226-en
General
-
Target
470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b
-
Size
326KB
-
MD5
75f3e0991ef168f43606b88d54754b99
-
SHA1
0656ed8861b18644d6d1a9883939bc6abd6b052f
-
SHA256
470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b
-
SHA512
663738363616a11b71b21256da8d16327f8da2380c77f5bf7816f5d08ce6ba637cb210fc16c6a1c84afb7555057e78615431b8d312ac55c3ea4ea5042d4150e7
-
SSDEEP
6144:YnX8ltEvbddsdJSU+Tu52z6SXCu252uNjqeHXAOBJ5c7:5EPsdsU+Tu52z6SXCuaNt3k7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b
Files
-
470c36ce171a93130e74d819606a549ea0d4ee0098a81fea8cb244970199078b.dll windows:6 windows x86 arch:x86
d779a221dc4795ade5015495943d355a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
CreateDirectoryW
GetModuleHandleW
GetProcAddress
GetCurrentThreadId
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcessId
GetLastError
SetLastError
GetCurrentProcess
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryExA
LoadLibraryExW
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQueryEx
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
GetModuleFileNameW
CloseHandle
LoadLibraryW
CreateProcessW
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
HeapFree
HeapAlloc
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
ReadConsoleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
shlwapi
PathRemoveFileSpecW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Exports
Exports
close_dump_report
get_version
open_dump_report
report_csharp_exception
set_app_id
set_device_id
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ