C:\repos\MPC-BE\_bin\mpc-be_x86\MPCBEShellExt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772.dll
Resource
win10v2004-20240508-en
General
-
Target
a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772
-
Size
139KB
-
MD5
0d8a1e33a9ad0fc43735836d44a9e75a
-
SHA1
60cafda08b1d03e4fb10a196a7ac18185d37c4bd
-
SHA256
a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772
-
SHA512
3e92fa2ebd7cf09f50f04c820b92161d5a344b453d3b83de3bb8a018ce8a4fbcb536d79e4106ce34a2c54ef57777f9cba500aa1bb0923072934bdff70b472627
-
SSDEEP
3072:hROnyxdJZRlULBq8qGPJf1r7rd54xiUTDqeYABlqxAjU4mb4U2q:/JZbUS47rEx8e7BrUIU2q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772
Files
-
a66891a2512b085efaec78644272b4971834cd3b4e880206837d7f7342769772.dll regsvr32 windows:6 windows x86 arch:x86
3d078b80599f6ce7fb950d7e6bf61fbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
LockResource
FindResourceExW
GetThreadLocale
SetThreadLocale
EncodePointer
CloseHandle
CreateFileW
HeapDestroy
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetFileType
GetStdHandle
Sleep
GetUserDefaultUILanguage
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
RaiseException
DecodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
FindClose
user32
GetSystemMetrics
CharNextW
LoadBitmapW
InsertMenuW
SetMenuItemBitmaps
ShowWindow
IsIconic
AllowSetForegroundWindow
GetWindowThreadProcessId
FindWindowW
SendMessageW
GetForegroundWindow
MonitorFromWindow
gdi32
DeleteObject
DeleteDC
BitBlt
StretchBlt
SetStretchBltMode
CreateDIBSection
GetObjectW
SelectObject
CreateCompatibleDC
advapi32
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
shell32
SHCreateShellItemArrayFromDataObject
ShellExecuteExW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
oleaut32
SysAllocString
UnRegisterTypeLi
LoadTypeLi
SysFreeString
SysStringLen
RegisterTypeLi
VarUI4FromStr
shlwapi
StrCmpLogicalW
PathStripPathW
PathFileExistsW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ