msrepl40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7.dll
Resource
win10v2004-20240508-en
General
-
Target
08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7
-
Size
742KB
-
MD5
22a5faece75e969b6a2bcb763e5a3ff4
-
SHA1
616964f474eb0314bd25df90ced3342d17beff91
-
SHA256
08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7
-
SHA512
98d45f43c9a4098a8806bb8d5bce9446dc1da49ae8c0f3dc15dc56014016564b2ef3099c4bea92fccfcf395a034dc4e6dd991d73f7b8ac95d56ac127b2236737
-
SSDEEP
12288:fYnS06kHtn7tLCCW7K9+vcTf87yzGKVJy/mwndtmmAxCTZz1P3OpI:fHEJAuimwnddPe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7
Files
-
08db759946fc199c3e9644b465ebcd4809085ec4e2904bcb490142f15d23ebe7.dll windows:6 windows x86 arch:x86
35ce06e0847a783203858e6667924396
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msjet40
ord138
ord145
ord107
ord157
ord112
ord108
ord180
ord136
ord1101
ord156
ord167
ord908
ord140
ord176
ord912
ord129
ord130
msjter40
ord4
ord3
ord5
advapi32
RegDeleteKeyA
RegFlushKey
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegEnumValueW
RegEnumValueA
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegEnumKeyA
kernel32
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CompareStringW
LCMapStringW
HeapReAlloc
HeapSize
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetComputerNameW
CreateFileA
DeleteFileA
CloseHandle
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
DisableThreadLibraryCalls
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempPathA
CreateFileW
DeleteFileW
FindFirstFileA
FindFirstFileW
GetDriveTypeA
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetShortPathNameW
GetTempFileNameW
GetTempPathW
SetLastError
CreateEventA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
GetShortPathNameA
GetTempFileNameA
CopyFileA
CopyFileW
MoveFileA
MoveFileW
GetComputerNameA
GetTimeZoneInformation
MultiByteToWideChar
WideCharToMultiByte
FindClose
Sleep
GetEnvironmentVariableA
GetFileSize
ReadFile
WriteFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
CreateProcessA
OpenProcess
CreateThread
TerminateThread
SuspendThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SetEvent
ResetEvent
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenEventA
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
WaitForMultipleObjects
OpenMutexA
CreateFileMappingA
OpenFileMappingA
GetStdHandle
GetCurrentProcessId
HeapFree
HeapAlloc
GetStringTypeW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineA
GetCurrentThreadId
GetProcessHeap
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
OutputDebugStringW
ole32
CoUninitialize
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
IIDFromString
user32
CharUpperW
PeekMessageA
CharUpperA
Sections
.text Size: 564KB - Virtual size: 563KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ