MSJTES40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0.dll
Resource
win10v2004-20240508-en
General
-
Target
2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0
-
Size
424KB
-
MD5
042238bd69039204020ba60db505f7e4
-
SHA1
8077343ed947542500d03e326fc41bd7b65a3601
-
SHA256
2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0
-
SHA512
9d76eaabdea0de31559a1aff4c4cfd1e6a5c11facc944371077bad70ebf643acf2efea8d10ace7af0b72ffab22853a0957f8ba6951719be7c0453bdabe4f9251
-
SSDEEP
12288:gb8ZPnJ0/D1geZgli6hd1jByC1RXUk3W:gb8igeZrQLjBvRkkm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0
Files
-
2ce628b8e48e21297f4b9e724748e01673b4836cf58e1cc8cfd91f06278752f0.dll regsvr32 windows:6 windows x86 arch:x86
89012f60eb4d7e91bee362762435270e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
kernel32
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryExA
CompareStringW
CompareStringA
lstrcmpiA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLCID
GetModuleFileNameW
InitializeCriticalSection
DeleteCriticalSection
RtlUnwind
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
RaiseException
GetCommandLineA
GetCurrentThreadId
SetLastError
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
HeapSize
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
LoadLibraryExW
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
SetStdHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
CloseHandle
ole32
CoGetMalloc
CoCreateGuid
IIDFromString
oleaut32
VarBstrFromI4
SafeArrayPutElement
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
CreateStdDispatch
SysAllocString
VariantInit
VariantClear
SysAllocStringLen
SysReAllocStringLen
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantCopy
VariantChangeType
VarI2FromStr
VarI4FromStr
VarR4FromStr
VarR8FromStr
VarDateFromStr
VarCyFromStr
VarBstrFromI2
SafeArrayAccessData
VarBstrFromR4
VarBstrFromR8
VarBstrFromCy
VarBstrFromDate
VarBstrFromDec
VarDecFromStr
LHashValOfNameSys
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayGetLBound
user32
IsCharAlphaA
IsCharAlphaW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ